Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1528540
MD5:9d7ea17aa6d8ec2653fbd07092d2a3d8
SHA1:87be9a5685f0cb4c5af2ee6edca095403c41a45e
SHA256:8178437df4f2521009fcf310fbcd17fd7a2084bb6e35cf0f5a52cf456f189a9b
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 5992 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 9D7EA17AA6D8EC2653FBD07092D2A3D8)
    • firefox.exe (PID: 5660 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 6756 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 6016 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7196 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2200 -prefsLen 25393 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf2d1419-78d8-4674-a0a7-5faab0442aeb} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a70710 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7824 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3548 -parentBuildID 20230927232528 -prefsHandle 1388 -prefMapHandle 1256 -prefsLen 26242 -prefMapSize 238472 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e3e6854-25f5-48be-aca9-16793ff11bca} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a42910 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7628 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5000 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5012 -prefMapHandle 4976 -prefsLen 33559 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62736bf5-4a6a-402e-9ae1-8f0951dc0690} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c1ab7d110 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 5992JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 15%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.7% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49722 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.11:49723 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.11:49728 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49751 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:49761 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:49762 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:49770 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:49769 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49925 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.11:49926 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.222.236.48:443 -> 192.168.2.11:49928 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.11:49935 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49936 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49937 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49938 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62877 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62878 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62879 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62881 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62882 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62880 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62883 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62885 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62888 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62886 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62884 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62887 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62889 version: TLS 1.2
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.7.dr
    Source: Binary string: wshbth.pdbGCTL source: firefox.exe, 00000007.00000003.1381271769.0000021C1E317000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 00000007.00000003.1376876971.0000021C1E309000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wshbth.pdb source: firefox.exe, 00000007.00000003.1381271769.0000021C1E317000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wsock32.pdbUGP source: firefox.exe, 00000007.00000003.1363989334.0000021C12105000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1365839200.0000021C12110000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 00000007.00000003.1377205619.0000021C1213F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.7.dr
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 00000007.00000003.1376876971.0000021C1E309000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 00000007.00000003.1377205619.0000021C1213F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wsock32.pdb source: firefox.exe, 00000007.00000003.1363989334.0000021C12105000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1365839200.0000021C12110000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_0081DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007EC2A2 FindFirstFileExW,1_2_007EC2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008268EE FindFirstFileW,FindClose,1_2_008268EE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_0082698F
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0081D076
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0081D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00829642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00829642
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0082979D
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00829B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00829B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00825C97 FindFirstFileW,FindNextFileW,FindClose,1_2_00825C97
    Source: firefox.exeMemory has grown: Private usage: 1MB later: 217MB
    Source: unknownNetwork traffic detected: DNS query count 32
    Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
    Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
    Source: Joe Sandbox ViewIP Address: 34.160.144.191 34.160.144.191
    Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,1_2_0082CE44
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: firefox.exe, 00000007.00000003.1453141327.000025DA71E03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1354528903.0000021C1387D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.facebook.com/* equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000007.00000003.1453141327.000025DA71E03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.facebook.com/*Z equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000007.00000003.1335981919.0000021C1476E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000007.00000003.1450978155.00001E056B303000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.youtube.com/* equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000007.00000003.1450978155.00001E056B303000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.youtube.com/*Z equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000007.00000003.1475709484.0000021C14B4A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.facebook.com/* equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000007.00000003.1464967159.0000021C1B18C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.youtube.com/* equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000007.00000003.1477916191.0000021C14732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000007.00000003.1477916191.0000021C14732000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1467252079.0000021C15129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000007.00000003.1475709484.0000021C14B4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1440923336.0000021C1B3B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000007.00000003.1464967159.0000021C1B18C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000007.00000003.1477916191.0000021C14732000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000007.00000003.1477916191.0000021C14732000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1467252079.0000021C15129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000F.00000002.2542300904.000001A235A03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000F.00000002.2542300904.000001A235A03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
    Source: firefox.exe, 0000000F.00000002.2542300904.000001A235A03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000010.00000002.2543014174.000001B566C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/nj` equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000010.00000002.2543014174.000001B566C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/nj` equals www.twitter.com (Twitter)
    Source: firefox.exe, 00000010.00000002.2543014174.000001B566C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/nj` equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000007.00000003.1464967159.0000021C1B18C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B18D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: moz-extension://7d71fa77-151c-427a-99c7-e68aa2a1f821/injections/js/bug1842437-www.youtube.com-performance-now-precision.js equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000007.00000003.1475709484.0000021C14B4A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1461022112.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1416317633.0000021C16A26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000007.00000003.1450607533.0000171A9D003000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1450331890.00000121D7503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.comZ equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000007.00000003.1461329736.0000021C16B7E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1464967159.0000021C1B18C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000007.00000003.1461022112.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com- equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000007.00000003.1440923336.0000021C1B3E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
    Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
    Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: example.org
    Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
    Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.facebook.com
    Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
    Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
    Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
    Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
    Source: global trafficDNS traffic detected: DNS query: www.reddit.com
    Source: global trafficDNS traffic detected: DNS query: twitter.com
    Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
    Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
    Source: firefox.exe, 00000007.00000003.1442473165.0000021C1AB6B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: firefox.exe, 00000007.00000003.1367201534.0000021C1212D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.7.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: firefox.exe, 00000007.00000003.1367201534.0000021C1212D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: firefox.exe, 00000007.00000003.1367201534.0000021C1212D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: firefox.exe, 00000007.00000003.1367201534.0000021C1212D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.7.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: firefox.exe, 00000007.00000003.1438077728.0000021C1E274000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
    Source: firefox.exe, 00000007.00000003.1441473682.0000021C1ACF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/
    Source: firefox.exe, 00000007.00000003.1438077728.0000021C1E274000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1439375348.0000021C1E264000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
    Source: firefox.exe, 00000007.00000003.1459944250.0000021C1E281000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
    Source: firefox.exe, 00000007.00000003.1459944250.0000021C1E281000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
    Source: firefox.exe, 00000007.00000003.1406647374.0000021C1406E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org
    Source: firefox.exe, 00000007.00000003.1304232667.0000021C12AD0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1302538767.0000021C1372A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1338150739.0000021C1DD54000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1352239751.0000021C16445000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1338150739.0000021C1DD5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324400223.0000021C1AE46000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1301731257.0000021C12AF5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324602154.0000021C1AE28000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1405023766.0000021C1E05C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1350797955.0000021C16445000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1322610495.0000021C14983000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1380423235.0000021C16AB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1301855817.0000021C13733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1399535906.0000021C1AE1A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1321110944.0000021C1AC2A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1442686455.0000021C16B86000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1457348724.0000021C1DD50000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1348535056.0000021C1E090000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1402478210.0000021C1444F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1462221047.0000021C15D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1478311463.0000021C12AD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
    Source: firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
    Source: firefox.exe, 00000007.00000003.1367201534.0000021C1212D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.7.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: firefox.exe, 00000007.00000003.1367201534.0000021C1212D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://ocsp.thawte.com0
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: http://www.mozilla.com0
    Source: firefox.exe, 00000007.00000003.1383816783.0000021C1E885000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1469048021.0000021C14FF6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1470681825.0000021C14875000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1469282558.0000021C14FC5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1322610495.0000021C149E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1437269468.0000021C1E885000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1322216028.0000021C14DDB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1480087387.0000021C1E885000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1471158993.0000021C1E885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
    Source: firefox.exe, 00000007.00000003.1469048021.0000021C14FF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul8
    Source: firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulchrome://global/content/printPreviewPag
    Source: firefox.exe, 0000000F.00000003.1312242980.000001A23683D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000003.1322681947.000001A23683D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2547726713.000001A23683D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000003.1320205324.000001A23683D000.00000004.00000020.00020000.00000000.sdmp, mozilla-temp-41.7.drString found in binary or memory: http://www.videolan.org/x264.html
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
    Source: firefox.exe, 00000007.00000003.1297878798.0000021C1257C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296628701.0000021C12300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296935989.0000021C1251B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
    Source: firefox.exe, 00000007.00000003.1462221047.0000021C15D37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
    Source: firefox.exe, 00000007.00000003.1460490933.0000021C1C5A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1440584553.0000021C1C5A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1464619160.0000021C1C5A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.comK
    Source: firefox.exe, 00000007.00000003.1420120541.0000021C16A3F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1382948304.0000021C14AC1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1381884302.0000021C16A4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1420259409.0000021C16A2C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1390462260.0000021C16A2C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1416317633.0000021C16A2C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1421314460.0000021C14AC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1321242976.0000021C1AB81000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1382421117.0000021C16A2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
    Source: firefox.exe, 00000007.00000003.1461022112.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/enhancer-for-youtube/
    Source: firefox.exe, 00000007.00000003.1461022112.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/facebook-container/
    Source: firefox.exe, 00000007.00000003.1461022112.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
    Source: firefox.exe, 00000007.00000003.1461022112.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/to-google-translate/
    Source: firefox.exe, 00000007.00000003.1461022112.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/wikipedia-context-menu-search/
    Source: firefox.exe, 00000007.00000003.1335981919.0000021C1476E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1440923336.0000021C1B3E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads.stickyadstv.com/firefox-etp
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C59A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C59A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
    Source: firefox.exe, 00000007.00000003.1460634420.0000021C1C592000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1442473165.0000021C1AB6B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1440761669.0000021C1C592000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1477838546.0000021C1473A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
    Source: firefox.exe, 0000000B.00000002.2543099438.00000253E09C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235AEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2545916635.000001B566F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.7.drString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696500454657.12791&key=1696500454400500
    Source: firefox.exe, 0000000B.00000002.2543099438.00000253E09C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235AEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2545916635.000001B566F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.7.drString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696500454657.12791&key=1696500454400500000.1&cta
    Source: firefox.exe, 00000007.00000003.1459037199.0000021C1E8E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1464029597.0000021C1E8E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1383518010.0000021C1E8E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://browser/menubar.ftl
    Source: firefox.exe, 00000007.00000003.1481179182.0000021C1B18D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
    Source: firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
    Source: firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
    Source: firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
    Source: firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
    Source: firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
    Source: firefox.exe, 00000007.00000003.1320469591.0000021C1ACF3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1539075
    Source: firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1539075experimental-features-webrtc-global-mute-toggles
    Source: firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
    Source: firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1607439
    Source: firefox.exe, 00000007.00000003.1320469591.0000021C1ACF3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1616739
    Source: firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1616739network.dns.echconfig.fallback_to_origin_when_al
    Source: firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
    Source: firefox.exe, 00000007.00000003.1458535461.0000021C1DDC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1694699#c21
    Source: firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
    Source: firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
    Source: firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
    Source: firefox.exe, 00000007.00000003.1297878798.0000021C1257C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296628701.0000021C12300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296935989.0000021C1251B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
    Source: firefox.exe, 0000000B.00000002.2543099438.00000253E09C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235AEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2545916635.000001B566F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.7.drString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
    Source: firefox.exe, 0000000B.00000002.2543099438.00000253E09C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235AEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2545916635.000001B566F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.7.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crbug.com/993268
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
    Source: firefox.exe, 00000007.00000003.1476455854.0000021C14B1B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1354528903.0000021C1387D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datastudio.google.com/embed/reporting/
    Source: firefox.exe, 00000007.00000003.1470105363.0000021C149AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
    Source: firefox.exe, 00000007.00000003.1470105363.0000021C149B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1470105363.0000021C149B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
    Source: firefox.exe, 00000007.00000003.1470105363.0000021C149B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/setPointerCaptureElementReleaseCaptureWarning
    Source: firefox.exe, 00000007.00000003.1457348724.0000021C1DD49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIEffectiveTLDServi
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
    Source: firefox.exe, 00000007.00000003.1352846210.0000021C1466B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1477916191.0000021C14732000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1397099069.0000021C1466B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297878798.0000021C1257C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296628701.0000021C12300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296935989.0000021C1251B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
    Source: firefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
    Source: firefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
    Source: firefox.exe, 00000007.00000003.1470105363.0000021C149B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://extensionworkshop.com/documentation/publish/self-distribution/
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235A12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
    Source: firefox.exe, 00000007.00000003.1328191632.0000021C1403B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/673d2808-e5d8-41b9-957
    Source: firefox.exe, 00000007.00000003.1328646117.0000021C1404C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1328191632.0000021C1403B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1329938080.0000021C16489000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
    Source: firefox.exe, 00000007.00000003.1329402239.0000021C15EDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
    Source: firefox.exe, 00000007.00000003.1322610495.0000021C14983000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/performance/scroll-linked_effects.html
    Source: firefox.exe, 00000007.00000003.1481179182.0000021C1B18D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/
    Source: firefox.exe, 00000007.00000003.1460325058.0000021C1DBDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235A12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
    Source: firefox.exe, 0000000F.00000002.2542300904.000001A235AC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566CC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
    Source: firefox.exe, 0000000F.00000002.2542300904.000001A235AC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566CC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
    Source: firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235A2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
    Source: firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtab
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL
    Source: firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtab
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC
    Source: firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtab
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA
    Source: firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtab
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE
    Source: firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtab
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG
    Source: firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab?
    Source: firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtab
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN
    Source: firefox.exe, 0000000F.00000002.2542300904.000001A235AC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566CC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
    Source: firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtab
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/
    Source: firefox.exe, 0000000F.00000002.2542300904.000001A235AC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566CC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS7
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/closure-compiler/issues/3177
    Source: firefox.exe, 00000007.00000003.1325455698.0000021C1AE47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324400223.0000021C1AE46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
    Source: firefox.exe, 00000007.00000003.1325455698.0000021C1AE47000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324400223.0000021C1AE46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/issues/1266
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
    Source: firefox.exe, 00000007.00000003.1296628701.0000021C12300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296935989.0000021C1251B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
    Source: firefox.exe, 00000007.00000003.1439417862.0000021C1DE25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported
    Source: firefox.exe, 00000007.00000003.1320469591.0000021C1ACF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/w3c/csswg-drafts/blob/master/css-grid-2/MASONRY-EXPLAINER.md
    Source: firefox.exe, 00000007.00000003.1320469591.0000021C1ACF3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/w3c/csswg-drafts/issues/4650
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/loose-envify)
    Source: firefox.exe, 00000007.00000003.1327158367.0000021C13267000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gpuweb.github.io/gpuweb/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
    Source: firefox.exe, 00000007.00000003.1453141327.000025DA71E03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1354528903.0000021C1387D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/oldsyncS
    Source: firefox.exe, 00000007.00000003.1477672555.0000021C14770000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/H
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/HCX
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj
    Source: prefs-1.js.7.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4CbW4pDk4pbW4CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
    Source: firefox.exe, 00000007.00000003.1438077728.0000021C1E280000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
    Source: firefox.exe, 00000010.00000002.2543014174.000001B566CF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
    Source: firefox.exe, 00000007.00000003.1481179182.0000021C1B18D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/events/1/48583f27-5bd5-49d7-bdb4-7be72
    Source: firefox.exe, 00000007.00000003.1467252079.0000021C1514C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/metrics/1/0bf14c53-99fb-445b-b4c1-dafc
    Source: firefox.exe, 00000007.00000003.1439375348.0000021C1E264000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/newtab/1/00002405-14fb-41bf-96fc-1151a
    Source: firefox.exe, 00000007.00000003.1460794271.0000021C1B2E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1389769053.0000021C1B2E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/4dc39a0c-a6a5-4aae
    Source: firefox.exe, 00000007.00000003.1460794271.0000021C1B2E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1389769053.0000021C1B2E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1439417862.0000021C1DE25000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/4fb31c00-002b-4457
    Source: firefox.exe, 00000007.00000003.1437733920.0000021C1E2E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1439417862.0000021C1DE25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1384304181.0000021C1E2E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1459725073.0000021C1E2E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/939a8ea4-888d-4de2
    Source: firefox.exe, 00000007.00000003.1460794271.0000021C1B2E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1389769053.0000021C1B2E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/ae580755-5a16-43cd
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submits
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
    Source: firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
    Source: firefox.exe, 00000007.00000003.1441614310.0000021C1ACAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
    Source: firefox.exe, 00000007.00000003.1462221047.0000021C15D49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: firefox.exe, 00000007.00000003.1462221047.0000021C15D49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
    Source: firefox.exe, 00000007.00000003.1476455854.0000021C14B1B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1354528903.0000021C1387D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lookerstudio.google.com/embed/reporting/
    Source: firefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
    Source: firefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
    Source: firefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
    Source: firefox.exe, 0000000F.00000002.2542300904.000001A235ACE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C86000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
    Source: firefox.exe, 00000007.00000003.1346921647.0000021C1E040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mochitest.youtube.com/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
    Source: firefox.exe, 00000007.00000003.1368992509.0000021C12124000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1365839200.0000021C12105000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1363989334.0000021C12105000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1365839200.0000021C12110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mozilla.org0/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
    Source: firefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
    Source: firefox.exe, 00000007.00000003.1346921647.0000021C1E040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.hbomax.com/page/
    Source: firefox.exe, 00000007.00000003.1346921647.0000021C1E040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.hbomax.com/player/
    Source: firefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
    Source: firefox.exe, 00000007.00000003.1481344340.0000021C1B114000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com
    Source: firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
    Source: firefox.exe, 00000007.00000003.1442473165.0000021C1AB6B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
    Source: firefox.exe, 00000007.00000003.1477838546.0000021C1473A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2&
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
    Source: firefox.exe, 00000007.00000003.1475709484.0000021C14B3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
    Source: firefox.exe, 00000007.00000003.1477838546.0000021C1473A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
    Source: firefox.exe, 00000007.00000003.1477838546.0000021C1473A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=AIzaSy
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
    Source: firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
    Source: firefox.exe, 00000007.00000003.1457348724.0000021C1DD49000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
    Source: firefox.exe, 00000007.00000003.1475709484.0000021C14B7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com
    Source: firefox.exe, 00000007.00000003.1481344340.0000021C1B10B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 00000007.00000003.1475709484.0000021C14B7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 00000007.00000003.1335981919.0000021C1476E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/facebook.svg
    Source: firefox.exe, 00000007.00000003.1335981919.0000021C1476E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/play.svg
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
    Source: firefox.exe, 00000007.00000003.1470533378.0000021C14959000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235A12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
    Source: firefox.exe, 00000007.00000003.1467252079.0000021C151F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#l
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1320994382.0000021C1AC6C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235AC2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566CF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
    Source: firefox.exe, 00000007.00000003.1476548596.0000021C147C6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1335981919.0000021C1476E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
    Source: firefox.exe, 00000007.00000003.1476548596.0000021C147C6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1335981919.0000021C1476E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
    Source: firefox.exe, 00000007.00000003.1472052464.0000021C1AD7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
    Source: firefox.exe, 00000007.00000003.1329402239.0000021C15EDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-def
    Source: firefox.exe, 00000007.00000003.1329402239.0000021C15EDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=spotlight
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
    Source: firefox.exe, 00000007.00000003.1460490933.0000021C1C5A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1440584553.0000021C1C5A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1464967159.0000021C1B18C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1464619160.0000021C1C5A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B18D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1468348732.0000021C1508E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
    Source: firefox.exe, 00000007.00000003.1477513038.0000021C14782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/firefox-relay-integration
    Source: firefox.exe, 00000007.00000003.1384304181.0000021C1E2A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/security-error
    Source: firefox.exe, 00000007.00000003.1460794271.0000021C1B2E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1437733920.0000021C1E2E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1467252079.0000021C1514F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1464967159.0000021C1B18C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1471158993.0000021C1E845000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1389769053.0000021C1B2E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1471740153.0000021C1B151000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1437269468.0000021C1E845000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1383991789.0000021C1E845000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1384304181.0000021C1E2E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B18D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1467252079.0000021C1514C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1459725073.0000021C1E2E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
    Source: firefox.exe, 00000007.00000003.1440761669.0000021C1C586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
    Source: firefox.exe, 00000007.00000003.1398647601.0000021C152A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings
    Source: firefox.exe, 00000007.00000003.1462221047.0000021C15D4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
    Source: firefox.exe, 00000007.00000003.1440761669.0000021C1C586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.Qb0WswhkLhoa
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
    Source: firefox.exe, 00000007.00000003.1477916191.0000021C14732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
    Source: firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
    Source: firefox.exe, 00000007.00000003.1477797437.0000021C1474D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://watch.sling.com/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
    Source: firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://webpack.js.org/concepts/mode/)
    Source: firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
    Source: firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
    Source: firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
    Source: firefox.exe, 00000007.00000003.1477916191.0000021C14732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
    Source: firefox.exe, 0000000B.00000002.2543099438.00000253E09C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235AEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2545916635.000001B566F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.7.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_f6f292994d7c60be109e4c185cbc03032d36d17160d4e639
    Source: firefox.exe, 00000007.00000003.1465164881.0000021C1AD90000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
    Source: gmpopenh264.dll.tmp.7.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: firefox.exe, 00000007.00000003.1470533378.0000021C14959000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
    Source: firefox.exe, 00000007.00000003.1324218371.0000021C1AEEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
    Source: firefox.exe, 00000007.00000003.1297878798.0000021C1257C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296628701.0000021C12300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296935989.0000021C1251B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
    Source: firefox.exe, 00000007.00000003.1352846210.0000021C1466B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1397099069.0000021C1466B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297878798.0000021C1257C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296628701.0000021C12300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296935989.0000021C1251B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
    Source: firefox.exe, 00000007.00000003.1346921647.0000021C1E040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.hulu.com/watch/
    Source: firefox.exe, 00000007.00000003.1346921647.0000021C1E040000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.instagram.com/
    Source: firefox.exe, 0000000B.00000002.2543099438.00000253E09C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235AEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2545916635.000001B566F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.7.drString found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
    Source: firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
    Source: firefox.exe, 00000007.00000003.1472052464.0000021C1AD7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
    Source: firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
    Source: firefox.exe, 00000007.00000003.1440761669.0000021C1C586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.8Z86fTxZfkM6
    Source: firefox.exe, 00000007.00000003.1328646117.0000021C1404C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1328191632.0000021C1403B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1329938080.0000021C16489000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
    Source: firefox.exe, 00000007.00000003.1440761669.0000021C1C586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.UnUp0v0CLe9Y
    Source: firefox.exe, 00000007.00000003.1477513038.0000021C14782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/about/legal/terms/subscription-services/
    Source: firefox.exe, 00000007.00000003.1464619160.0000021C1C5A6000.00000004.00000800.00020000.00000000.sdmp, targeting.snapshot.json.tmp.7.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
    Source: firefox.exe, 00000007.00000003.1440761669.0000021C1C586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
    Source: firefox.exe, 00000007.00000003.1450978155.00001E056B303000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Z
    Source: firefox.exe, 00000007.00000003.1477513038.0000021C14782000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/subscription-services/
    Source: firefox.exe, 00000007.00000003.1440761669.0000021C1C586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
    Source: firefox.exe, 00000010.00000002.2543014174.000001B566CF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
    Source: firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-content
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP
    Source: firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/V
    Source: firefox.exe, 00000007.00000003.1440761669.0000021C1C586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
    Source: firefox.exe, 00000007.00000003.1462221047.0000021C15D4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
    Source: firefox.exe, 00000007.00000003.1467252079.0000021C15129000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
    Source: firefox.exe, 00000007.00000003.1477797437.0000021C1474D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sling.com/
    Source: firefox.exe, 00000007.00000003.1453141327.000025DA71E03000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1351863997.0000021C13865000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1475709484.0000021C14B7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353547234.0000021C13882000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/
    Source: firefox.exe, 00000010.00000002.2543014174.000001B566C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
    Source: firefox.exe, 00000007.00000003.1468875530.0000021C15036000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1450180115.000027CBE4D03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
    Source: firefox.exe, 00000007.00000003.1321736225.0000021C1AB5E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1468348732.0000021C1505A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1442473165.0000021C1AB5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/
    Source: recovery.jsonlz4.tmp.7.drString found in binary or memory: https://youtube.com/account?=
    Source: file.exe, 00000001.00000003.1293303982.000000000149A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1293056057.000000000149A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.1295037757.000000000149A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=htt
    Source: firefox.exe, 00000010.00000002.2540918719.000001B566940000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig
    Source: firefox.exe, 0000000B.00000002.2541646202.00000253E06EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challeng
    Source: firefox.exe, 00000010.00000002.2542435543.000001B566ABA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2540918719.000001B566944000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 00000003.00000002.1276502248.00000165D6431000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000006.00000002.1283680722.00000280B29B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
    Source: firefox.exe, 00000010.00000002.2542435543.000001B566AB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd5
    Source: firefox.exe, 0000000B.00000002.2541646202.00000253E06E0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2546042721.00000253E0A24000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2541626834.000001A2358E4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2540137162.000001A235840000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2542435543.000001B566AB0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2540918719.000001B566944000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
    Source: file.exe, 00000001.00000002.1294369126.0000000001468000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdUsers
    Source: firefox.exe, 00000007.00000003.1450180115.000027CBE4D03000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.comZ
    Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62888 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62880 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
    Source: unknownNetwork traffic detected: HTTP traffic on port 49929 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62885 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62879 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62886 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
    Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49927 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62883 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62877 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49938 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62890 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62884 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62876
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62877
    Source: unknownNetwork traffic detected: HTTP traffic on port 62878 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62878
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62879
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49938
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49937
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49936
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62889 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49925 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
    Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62881 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62887
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62888
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62889
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49929
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49928
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49927
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62880
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49926
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62881
    Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49925
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62882
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62883
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62884
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62885
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62886
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
    Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62882 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49937 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62890
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
    Source: unknownNetwork traffic detected: HTTP traffic on port 62876 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 62887 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49905
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49722 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.11:49723 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.11:49728 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49751 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:49761 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:49762 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:49770 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:49769 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49925 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.11:49926 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.222.236.48:443 -> 192.168.2.11:49928 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.11:49935 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49936 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49937 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.11:49938 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62877 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62878 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62879 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62881 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62882 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62880 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62883 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62885 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62888 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62886 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62884 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62887 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.11:62889 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_0082EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_0082ED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_0082EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,1_2_0081AA57
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00849576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_00849576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000001.00000000.1272597915.0000000000872000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5717f0c4-8
    Source: file.exe, 00000001.00000000.1272597915.0000000000872000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c0ae2aa6-b
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ba368d33-f
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b4f3a3bb-8
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 15_2_000001A235FB4B77 NtQuerySystemInformation,15_2_000001A235FB4B77
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 15_2_000001A235FD9C32 NtQuerySystemInformation,15_2_000001A235FD9C32
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081D5EB: CreateFileW,DeviceIoControl,CloseHandle,1_2_0081D5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00811201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00811201
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_0081E8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007B80601_2_007B8060
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008220461_2_00822046
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008182981_2_00818298
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007EE4FF1_2_007EE4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007E676B1_2_007E676B
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008448731_2_00844873
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007BCAF01_2_007BCAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007DCAA01_2_007DCAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007CCC391_2_007CCC39
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007E6DD91_2_007E6DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007CB1191_2_007CB119
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007B91C01_2_007B91C0
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D13941_2_007D1394
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D17061_2_007D1706
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D781B1_2_007D781B
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007C997D1_2_007C997D
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007B79201_2_007B7920
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D19B01_2_007D19B0
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D7A4A1_2_007D7A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D1C771_2_007D1C77
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D7CA71_2_007D7CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007E9EEE1_2_007E9EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0083BE441_2_0083BE44
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D1F321_2_007D1F32
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 15_2_000001A235FB4B7715_2_000001A235FB4B77
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 15_2_000001A235FD9C3215_2_000001A235FD9C32
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 15_2_000001A235FDA35C15_2_000001A235FDA35C
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 15_2_000001A235FD9C7215_2_000001A235FD9C72
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007CF9F2 appears 40 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007D0A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 007B9CB3 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@19/36@71/12
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008237B5 GetLastError,FormatMessageW,1_2_008237B5
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008110BF AdjustTokenPrivileges,CloseHandle,1_2_008110BF
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008116C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_008116C3
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008251CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,1_2_008251CD
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,1_2_0081D4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,1_2_0082648E
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007B42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_007B42A2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1383991789.0000021C1E813000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE events (id INTEGER PRIMARY KEY, type INTEGER NOT NULL, count INTEGER NOT NULL, timestamp DATE );
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO events (type, count, timestamp) VALUES (:type, 1, date(:date));
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;
    Source: firefox.exe, 00000007.00000003.1440198332.0000021C1DBD7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;Fy6
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;-
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9'
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9
    Source: firefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE type = :type AND timestamp = date(:date);
    Source: file.exeReversingLabs: Detection: 15%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
    Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2200 -prefsLen 25393 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf2d1419-78d8-4674-a0a7-5faab0442aeb} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a70710 socket
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3548 -parentBuildID 20230927232528 -prefsHandle 1388 -prefMapHandle 1256 -prefsLen 26242 -prefMapSize 238472 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e3e6854-25f5-48be-aca9-16793ff11bca} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a42910 rdd
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5000 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5012 -prefMapHandle 4976 -prefsLen 33559 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62736bf5-4a6a-402e-9ae1-8f0951dc0690} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c1ab7d110 utility
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2200 -prefsLen 25393 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf2d1419-78d8-4674-a0a7-5faab0442aeb} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a70710 socketJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3548 -parentBuildID 20230927232528 -prefsHandle 1388 -prefMapHandle 1256 -prefsLen 26242 -prefMapSize 238472 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e3e6854-25f5-48be-aca9-16793ff11bca} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a42910 rddJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5000 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5012 -prefMapHandle 4976 -prefsLen 33559 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62736bf5-4a6a-402e-9ae1-8f0951dc0690} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c1ab7d110 utilityJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.7.dr
    Source: Binary string: wshbth.pdbGCTL source: firefox.exe, 00000007.00000003.1381271769.0000021C1E317000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 00000007.00000003.1376876971.0000021C1E309000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wshbth.pdb source: firefox.exe, 00000007.00000003.1381271769.0000021C1E317000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wsock32.pdbUGP source: firefox.exe, 00000007.00000003.1363989334.0000021C12105000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1365839200.0000021C12110000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 00000007.00000003.1377205619.0000021C1213F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.7.dr
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 00000007.00000003.1376876971.0000021C1E309000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 00000007.00000003.1377205619.0000021C1213F000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wsock32.pdb source: firefox.exe, 00000007.00000003.1363989334.0000021C12105000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1365839200.0000021C12110000.00000004.00000020.00020000.00000000.sdmp
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_007B42DE
    Source: gmpopenh264.dll.tmp.7.drStatic PE information: section name: .rodata
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D0A76 push ecx; ret 1_2_007D0A89
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007CF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_007CF98E
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00841C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00841C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_1-95814
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 15_2_000001A235FB4B77 rdtsc 15_2_000001A235FB4B77
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.3 %
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_0081DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007EC2A2 FindFirstFileExW,1_2_007EC2A2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008268EE FindFirstFileW,FindClose,1_2_008268EE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_0082698F
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0081D076
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0081D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00829642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00829642
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0082979D
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00829B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00829B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00825C97 FindFirstFileW,FindNextFileW,FindClose,1_2_00825C97
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_007B42DE
    Source: firefox.exe, 0000000F.00000002.2546314128.000001A236140000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllw
    Source: firefox.exe, 00000010.00000002.2542435543.000001B566ABA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW A
    Source: firefox.exe, 0000000B.00000002.2547182629.00000253E0C08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln
    Source: firefox.exe, 00000010.00000002.2545588906.000001B566D20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWt
    Source: firefox.exe, 0000000B.00000002.2541646202.00000253E06EA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2546314128.000001A236140000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2540137162.000001A23584A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: firefox.exe, 0000000B.00000002.2546558078.00000253E0B20000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
    Source: firefox.exe, 0000000B.00000002.2547182629.00000253E0C08000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2546314128.000001A236140000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 15_2_000001A235FB4B77 rdtsc 15_2_000001A235FB4B77
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0082EAA2 BlockInput,1_2_0082EAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007E2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_007E2622
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_007B42DE
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D4CE8 mov eax, dword ptr fs:[00000030h]1_2_007D4CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00810B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,1_2_00810B62
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007E2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_007E2622
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_007D083F
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D09D5 SetUnhandledExceptionFilter,1_2_007D09D5
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_007D0C21
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00811201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00811201
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007F2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_007F2BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0081B226 SendInput,keybd_event,1_2_0081B226
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_008322DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,1_2_008322DA
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00810B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,1_2_00810B62
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00811663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_00811663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007D0698 cpuid 1_2_007D0698
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00828195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,1_2_00828195
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0080D27A GetUserNameW,1_2_0080D27A
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007EB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,1_2_007EB952
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_007B42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_007B42DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 5992, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 5992, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00831204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_00831204
    Source: C:\Users\user\Desktop\file.exeCode function: 1_2_00831806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00831806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Native API
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    1
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    12
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    Extra Window Memory Injection
    2
    Obfuscated Files or Information
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
    Valid Accounts
    1
    DLL Side-Loading
    NTDS15
    System Information Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
    Access Token Manipulation
    1
    Extra Window Memory Injection
    LSA Secrets131
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
    Process Injection
    1
    Masquerading
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Valid Accounts
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Virtualization/Sandbox Evasion
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
    Access Token Manipulation
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
    Process Injection
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528540 Sample: file.exe Startdate: 08/10/2024 Architecture: WINDOWS Score: 72 29 youtube.com 2->29 31 youtube-ui.l.google.com 2->31 33 35 other IPs or domains 2->33 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected Credential Flusher 2->43 45 Binary is likely a compiled AutoIt script file 2->45 47 2 other signatures 2->47 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 49 Binary is likely a compiled AutoIt script file 8->49 51 Found API chain indicative of sandbox detection 8->51 13 firefox.exe 1 8->13         started        15 firefox.exe 3 232 11->15         started        process6 dnsIp7 35 youtube.com 142.250.185.206, 443, 49715, 49716 GOOGLEUS United States 15->35 37 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49717, 49725, 49726 GOOGLEUS United States 15->37 39 10 other IPs or domains 15->39 25 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 15->25 dropped 27 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 15->27 dropped 19 firefox.exe 1 15->19         started        21 firefox.exe 1 15->21         started        23 firefox.exe 1 15->23         started        file8 process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe16%ReversingLabs
    file.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://login.microsoftonline.com0%URL Reputationsafe
    http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
    https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    example.org
    93.184.215.14
    truefalse
      unknown
      star-mini.c10r.facebook.com
      157.240.0.35
      truefalse
        unknown
        prod.classify-client.prod.webservices.mozgcp.net
        35.190.72.216
        truefalse
          unknown
          prod.balrog.prod.cloudops.mozgcp.net
          35.244.181.201
          truefalse
            unknown
            twitter.com
            104.244.42.65
            truefalse
              unknown
              prod.detectportal.prod.cloudops.mozgcp.net
              34.107.221.82
              truefalse
                unknown
                services.addons.mozilla.org
                52.222.236.48
                truefalse
                  unknown
                  dyna.wikimedia.org
                  185.15.59.224
                  truefalse
                    unknown
                    prod.remote-settings.prod.webservices.mozgcp.net
                    34.149.100.209
                    truefalse
                      unknown
                      contile.services.mozilla.com
                      34.117.188.166
                      truefalse
                        unknown
                        youtube.com
                        142.250.185.206
                        truefalse
                          unknown
                          prod.content-signature-chains.prod.webservices.mozgcp.net
                          34.160.144.191
                          truefalse
                            unknown
                            youtube-ui.l.google.com
                            142.250.186.46
                            truefalse
                              unknown
                              reddit.map.fastly.net
                              151.101.1.140
                              truefalse
                                unknown
                                us-west1.prod.sumo.prod.webservices.mozgcp.net
                                34.149.128.2
                                truefalse
                                  unknown
                                  ipv4only.arpa
                                  192.0.0.170
                                  truefalse
                                    unknown
                                    prod.ads.prod.webservices.mozgcp.net
                                    34.117.188.166
                                    truefalse
                                      unknown
                                      push.services.mozilla.com
                                      34.107.243.93
                                      truefalse
                                        unknown
                                        normandy-cdn.services.mozilla.com
                                        35.201.103.21
                                        truefalse
                                          unknown
                                          telemetry-incoming.r53-2.services.mozilla.com
                                          34.120.208.123
                                          truefalse
                                            unknown
                                            www.reddit.com
                                            unknown
                                            unknownfalse
                                              unknown
                                              spocs.getpocket.com
                                              unknown
                                              unknownfalse
                                                unknown
                                                content-signature-2.cdn.mozilla.net
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  support.mozilla.org
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    firefox.settings.services.mozilla.com
                                                    unknown
                                                    unknownfalse
                                                      unknown
                                                      www.youtube.com
                                                      unknown
                                                      unknownfalse
                                                        unknown
                                                        www.facebook.com
                                                        unknown
                                                        unknownfalse
                                                          unknown
                                                          241.42.69.40.in-addr.arpa
                                                          unknown
                                                          unknownfalse
                                                            unknown
                                                            detectportal.firefox.com
                                                            unknown
                                                            unknownfalse
                                                              unknown
                                                              normandy.cdn.mozilla.net
                                                              unknown
                                                              unknownfalse
                                                                unknown
                                                                shavar.services.mozilla.com
                                                                unknown
                                                                unknownfalse
                                                                  unknown
                                                                  www.wikipedia.org
                                                                  unknown
                                                                  unknownfalse
                                                                    unknown
                                                                    NameSourceMaliciousAntivirus DetectionReputation
                                                                    https://youtube.comZfirefox.exe, 00000007.00000003.1450180115.000027CBE4D03000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 0000000F.00000002.2542300904.000001A235AC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566CC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          http://detectportal.firefox.com/firefox.exe, 00000007.00000003.1441473682.0000021C1ACF0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://datastudio.google.com/embed/reporting/firefox.exe, 00000007.00000003.1476455854.0000021C14B1B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1354528903.0000021C1387D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                http://www.mozilla.com0gmpopenh264.dll.tmp.7.drfalse
                                                                                  unknown
                                                                                  https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecyclfirefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 0000000F.00000002.2542300904.000001A235ACE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C86000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://www.leboncoin.fr/firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          https://spocs.getpocket.com/spocsfirefox.exe, 00000007.00000003.1467252079.0000021C151F2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1436757446.0000021C11DA0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://shavar.services.mozilla.comfirefox.exe, 00000007.00000003.1475709484.0000021C14B7F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              https://completion.amazon.com/search/complete?q=firefox.exe, 00000007.00000003.1297878798.0000021C1257C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296628701.0000021C12300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296935989.0000021C1251B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  https://ads.stickyadstv.com/firefox-etpfirefox.exe, 00000007.00000003.1335981919.0000021C1476E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1440923336.0000021C1B3E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    https://identity.mozilla.com/ids/ecosystem_telemetryUfirefox.exe, 00000007.00000003.1440584553.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1460490933.0000021C1C5D7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        https://monitor.firefox.com/breach-details/firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://github.com/w3c/csswg-drafts/issues/4650firefox.exe, 00000007.00000003.1320469591.0000021C1ACF3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              https://www.amazon.com/exec/obidos/external-search/firefox.exe, 00000007.00000003.1465164881.0000021C1AD90000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                https://www.msn.comfirefox.exe, 00000007.00000003.1462221047.0000021C15D4F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  unknown
                                                                                                                  https://github.com/mozilla-services/screenshotsfirefox.exe, 00000007.00000003.1296628701.0000021C12300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296935989.0000021C1251B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    unknown
                                                                                                                    https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                      unknown
                                                                                                                      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/switching-devices?utm_source=panel-deffirefox.exe, 00000007.00000003.1329402239.0000021C15EDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        unknown
                                                                                                                        https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                          unknown
                                                                                                                          https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                            unknown
                                                                                                                            https://youtube.com/firefox.exe, 00000007.00000003.1321736225.0000021C1AB5E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1468348732.0000021C1505A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1442473165.0000021C1AB5E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                              unknown
                                                                                                                              https://youtube.com/account?=httfile.exe, 00000001.00000003.1293303982.000000000149A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.1293056057.000000000149A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.1295037757.000000000149A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                unknown
                                                                                                                                https://www.instagram.com/firefox.exe, 00000007.00000003.1346921647.0000021C1E040000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                  unknown
                                                                                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                    unknown
                                                                                                                                    https://api.accounts.firefox.com/v1firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                      unknown
                                                                                                                                      https://www.amazon.com/firefox.exe, 00000007.00000003.1477916191.0000021C14732000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                        unknown
                                                                                                                                        https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                          unknown
                                                                                                                                          https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullScfirefox.exe, 00000007.00000003.1470105363.0000021C149AA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                            unknown
                                                                                                                                            https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                              unknown
                                                                                                                                              https://www.youtube.com/firefox.exe, 00000010.00000002.2543014174.000001B566C0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                unknown
                                                                                                                                                https://bugzilla.mozilla.org/show_bug.cgi?id=1283601firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                  unknown
                                                                                                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                    unknown
                                                                                                                                                    https://addons.mozilla.org/firefox/addon/to-google-translate/firefox.exe, 00000007.00000003.1461022112.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                      unknown
                                                                                                                                                      https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 0000000F.00000002.2542300904.000001A235AC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566CC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                        unknown
                                                                                                                                                        http://127.0.0.1:firefox.exe, 00000007.00000003.1442473165.0000021C1AB6B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                          unknown
                                                                                                                                                          https://bugzilla.mozilla.org/show_bug.cgi?id=1266220firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                            unknown
                                                                                                                                                            https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152firefox.exe, 00000007.00000003.1457348724.0000021C1DD49000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                              unknown
                                                                                                                                                              https://bugzilla.mofirefox.exe, 00000007.00000003.1481179182.0000021C1B18D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                unknown
                                                                                                                                                                https://mitmdetection.services.mozilla.com/firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                  unknown
                                                                                                                                                                  https://static.adsafeprotected.com/firefox-etp-jsfirefox.exe, 00000007.00000003.1476548596.0000021C147C6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1335981919.0000021C1476E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                    unknown
                                                                                                                                                                    https://youtube.com/account?=recovery.jsonlz4.tmp.7.drfalse
                                                                                                                                                                      unknown
                                                                                                                                                                      https://shavar.services.mozilla.com/firefox.exe, 00000007.00000003.1481344340.0000021C1B10B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                        unknown
                                                                                                                                                                        https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpgfirefox.exe, 0000000B.00000002.2543099438.00000253E09C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235AEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2545916635.000001B566F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.7.drfalse
                                                                                                                                                                          unknown
                                                                                                                                                                          https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapturefirefox.exe, 00000007.00000003.1470105363.0000021C149B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1470105363.0000021C149B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                            unknown
                                                                                                                                                                            https://spocs.getpocket.com/firefox.exe, 00000007.00000003.1321999452.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1473793540.0000021C163B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235A12000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2543014174.000001B566C13000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                              unknown
                                                                                                                                                                              https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                unknown
                                                                                                                                                                                https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                  unknown
                                                                                                                                                                                  https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                    unknown
                                                                                                                                                                                    https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                      unknown
                                                                                                                                                                                      https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                        unknown
                                                                                                                                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                          unknown
                                                                                                                                                                                          https://bugzilla.mozilla.org/show_bug.cgi?id=1584464firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                            unknown
                                                                                                                                                                                            https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                              unknown
                                                                                                                                                                                              https://monitor.firefox.com/user/dashboardfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                unknown
                                                                                                                                                                                                https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                  unknown
                                                                                                                                                                                                  https://browser/menubar.ftlfirefox.exe, 00000007.00000003.1459037199.0000021C1E8E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1464029597.0000021C1E8E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1383518010.0000021C1E8E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                    unknown
                                                                                                                                                                                                    https://monitor.firefox.com/aboutfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                      unknown
                                                                                                                                                                                                      http://mozilla.org/MPL/2.0/.firefox.exe, 00000007.00000003.1304232667.0000021C12AD0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1302538767.0000021C1372A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1338150739.0000021C1DD54000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1352239751.0000021C16445000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1338150739.0000021C1DD5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324400223.0000021C1AE46000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1301731257.0000021C12AF5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324602154.0000021C1AE28000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1405023766.0000021C1E05C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1350797955.0000021C16445000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1322610495.0000021C14983000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1380423235.0000021C16AB7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1301855817.0000021C13733000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1399535906.0000021C1AE1A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1321110944.0000021C1AC2A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1442686455.0000021C16B86000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1457348724.0000021C1DD50000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1348535056.0000021C1E090000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1402478210.0000021C1444F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1462221047.0000021C15D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1478311463.0000021C12AD9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                        unknown
                                                                                                                                                                                                        https://account.bellmedia.cfirefox.exe, 00000007.00000003.1462221047.0000021C15D37000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                          unknown
                                                                                                                                                                                                          https://login.microsoftonline.comfirefox.exe, 00000007.00000003.1462221047.0000021C15D49000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                          • URL Reputation: safe
                                                                                                                                                                                                          unknown
                                                                                                                                                                                                          https://coverage.mozilla.orgfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                            unknown
                                                                                                                                                                                                            http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.7.drfalse
                                                                                                                                                                                                            • URL Reputation: safe
                                                                                                                                                                                                            unknown
                                                                                                                                                                                                            https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839firefox.exe, 00000007.00000003.1329402239.0000021C15EDD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                              unknown
                                                                                                                                                                                                              https://infra.spec.whatwg.org/#ascii-whitespacefirefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                unknown
                                                                                                                                                                                                                https://blocked.cdn.mozilla.net/firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                  unknown
                                                                                                                                                                                                                  https://json-schema.org/draft/2019-09/schemafirefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                    unknown
                                                                                                                                                                                                                    https://profiler.firefox.comfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                      unknown
                                                                                                                                                                                                                      https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                        unknown
                                                                                                                                                                                                                        https://identity.mozilla.com/apps/relayfirefox.exe, 00000007.00000003.1477672555.0000021C14770000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                          unknown
                                                                                                                                                                                                                          https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                            unknown
                                                                                                                                                                                                                            https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 00000007.00000003.1462221047.0000021C15D4F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                              unknown
                                                                                                                                                                                                                              https://bugzilla.mozilla.org/show_bug.cgi?id=1678448firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                unknown
                                                                                                                                                                                                                                https://mail.yahoo.co.jp/compose/?To=%sfirefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                  unknown
                                                                                                                                                                                                                                  https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/firefox.exe, 00000007.00000003.1461022112.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1481179182.0000021C1B1DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                    unknown
                                                                                                                                                                                                                                    https://contile.services.mozilla.com/v1/tilesfirefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                      unknown
                                                                                                                                                                                                                                      https://www.amazon.co.uk/firefox.exe, 00000007.00000003.1327098847.0000021C1326A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                        unknown
                                                                                                                                                                                                                                        https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/firefox.exe, 00000007.00000003.1460325058.0000021C1DBDF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                          unknown
                                                                                                                                                                                                                                          https://monitor.firefox.com/user/preferencesfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                            unknown
                                                                                                                                                                                                                                            https://screenshots.firefox.com/firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                              unknown
                                                                                                                                                                                                                                              https://www.google.com/searchfirefox.exe, 00000007.00000003.1352846210.0000021C1466B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1397099069.0000021C1466B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297878798.0000021C1257C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296628701.0000021C12300000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1296935989.0000021C1251B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297245119.0000021C12534000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297522945.0000021C1254D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1297741217.0000021C12567000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                unknown
                                                                                                                                                                                                                                                https://gpuweb.github.io/gpuweb/firefox.exe, 00000007.00000003.1327158367.0000021C13267000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                  unknown
                                                                                                                                                                                                                                                  https://relay.firefox.com/api/v1/firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                    unknown
                                                                                                                                                                                                                                                    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-reportfirefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                      unknown
                                                                                                                                                                                                                                                      https://topsites.services.mozilla.com/cid/firefox.exe, 0000000B.00000002.2542679815.00000253E0780000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 0000000F.00000002.2545287939.000001A235F60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2545687362.000001B566E20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                                                                                                                                                        unknown
                                                                                                                                                                                                                                                        https://twitter.com/firefox.exe, 00000007.00000003.1477916191.0000021C14732000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                          unknown
                                                                                                                                                                                                                                                          https://bugzilla.mozilla.org/show_bug.cgi?id=1193802firefox.exe, 00000007.00000003.1354457811.0000021C13887000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1353513006.0000021C13887000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                            unknown
                                                                                                                                                                                                                                                            https://poczta.interia.pl/mh/?mailto=%sfirefox.exe, 00000007.00000003.1299429314.0000021C11D33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433436437.0000021C11D39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300440958.0000021C11D2F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1300339832.0000021C11D18000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1433213601.0000021C11D39000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                              unknown
                                                                                                                                                                                                                                                              https://www.google.com/complete/searchfirefox.exe, 00000007.00000003.1324218371.0000021C1AEEE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                unknown
                                                                                                                                                                                                                                                                https://watch.sling.com/firefox.exe, 00000007.00000003.1477797437.0000021C1474D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                  unknown
                                                                                                                                                                                                                                                                  https://getpocket.com/firefox/new_tab_learn_more/firefox.exe, 00000007.00000003.1472871445.0000021C1AC38000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                    unknown
                                                                                                                                                                                                                                                                    https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgfirefox.exe, 0000000B.00000002.2543099438.00000253E09C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2542300904.000001A235AEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2545916635.000001B566F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.7.drfalse
                                                                                                                                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                                                                                                                                    unknown
                                                                                                                                                                                                                                                                    https://github.com/google/closure-compiler/issues/3177firefox.exe, 00000007.00000003.1399535906.0000021C1AE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1323619682.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1325455698.0000021C1AE51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000007.00000003.1324283662.0000021C1AE53000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                                                                                                                                                      unknown
                                                                                                                                                                                                                                                                      • No. of IPs < 25%
                                                                                                                                                                                                                                                                      • 25% < No. of IPs < 50%
                                                                                                                                                                                                                                                                      • 50% < No. of IPs < 75%
                                                                                                                                                                                                                                                                      • 75% < No. of IPs
                                                                                                                                                                                                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                                                                                                                                      142.250.185.206
                                                                                                                                                                                                                                                                      youtube.comUnited States
                                                                                                                                                                                                                                                                      15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                      34.149.100.209
                                                                                                                                                                                                                                                                      prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                                                                                                                      2686ATGS-MMD-ASUSfalse
                                                                                                                                                                                                                                                                      34.107.243.93
                                                                                                                                                                                                                                                                      push.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                      15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                      34.107.221.82
                                                                                                                                                                                                                                                                      prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                                                                                                                                                                                      15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                      35.244.181.201
                                                                                                                                                                                                                                                                      prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                                                                                                                                                                                      15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                      34.117.188.166
                                                                                                                                                                                                                                                                      contile.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                      139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                                                                                                                                                                      35.201.103.21
                                                                                                                                                                                                                                                                      normandy-cdn.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                      15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                      35.190.72.216
                                                                                                                                                                                                                                                                      prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                                                                                                                      15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                      34.160.144.191
                                                                                                                                                                                                                                                                      prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                                                                                                                                                                                      2686ATGS-MMD-ASUSfalse
                                                                                                                                                                                                                                                                      34.120.208.123
                                                                                                                                                                                                                                                                      telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                                                                                                                                                                                      15169GOOGLEUSfalse
                                                                                                                                                                                                                                                                      52.222.236.48
                                                                                                                                                                                                                                                                      services.addons.mozilla.orgUnited States
                                                                                                                                                                                                                                                                      16509AMAZON-02USfalse
                                                                                                                                                                                                                                                                      IP
                                                                                                                                                                                                                                                                      127.0.0.1
                                                                                                                                                                                                                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                                                                                                                                                                                                                      Analysis ID:1528540
                                                                                                                                                                                                                                                                      Start date and time:2024-10-08 00:49:36 +02:00
                                                                                                                                                                                                                                                                      Joe Sandbox product:CloudBasic
                                                                                                                                                                                                                                                                      Overall analysis duration:0h 6m 28s
                                                                                                                                                                                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                                                                                                                                                                                      Report type:full
                                                                                                                                                                                                                                                                      Cookbook file name:default.jbs
                                                                                                                                                                                                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                                                                                                                                      Number of analysed new started processes analysed:22
                                                                                                                                                                                                                                                                      Number of new started drivers analysed:0
                                                                                                                                                                                                                                                                      Number of existing processes analysed:0
                                                                                                                                                                                                                                                                      Number of existing drivers analysed:0
                                                                                                                                                                                                                                                                      Number of injected processes analysed:0
                                                                                                                                                                                                                                                                      Technologies:
                                                                                                                                                                                                                                                                      • HCA enabled
                                                                                                                                                                                                                                                                      • EGA enabled
                                                                                                                                                                                                                                                                      • AMSI enabled
                                                                                                                                                                                                                                                                      Analysis Mode:default
                                                                                                                                                                                                                                                                      Analysis stop reason:Timeout
                                                                                                                                                                                                                                                                      Sample name:file.exe
                                                                                                                                                                                                                                                                      Detection:MAL
                                                                                                                                                                                                                                                                      Classification:mal72.troj.evad.winEXE@19/36@71/12
                                                                                                                                                                                                                                                                      EGA Information:
                                                                                                                                                                                                                                                                      • Successful, ratio: 50%
                                                                                                                                                                                                                                                                      HCA Information:
                                                                                                                                                                                                                                                                      • Successful, ratio: 96%
                                                                                                                                                                                                                                                                      • Number of executed functions: 38
                                                                                                                                                                                                                                                                      • Number of non-executed functions: 316
                                                                                                                                                                                                                                                                      Cookbook Comments:
                                                                                                                                                                                                                                                                      • Found application associated with file extension: .exe
                                                                                                                                                                                                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                                                                                                                                                                                                                                      • Excluded IPs from analysis (whitelisted): 44.238.148.23, 44.224.63.42, 44.242.27.108, 142.250.184.202, 142.250.185.202, 142.250.185.74, 2.22.61.59, 2.22.61.56, 142.250.185.238, 142.250.186.142
                                                                                                                                                                                                                                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, shavar.prod.mozaws.net, ciscobinary.openh264.org, otelrules.azureedge.net, slscr.update.microsoft.com, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, safebrowsing.googleapis.com, location.services.mozilla.com
                                                                                                                                                                                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                                                                                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                                                                                                                                      • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                                                                                                                                                                      • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                                                                                                                                                                      • VT rate limit hit for: file.exe
                                                                                                                                                                                                                                                                      TimeTypeDescription
                                                                                                                                                                                                                                                                      18:50:36API Interceptor1x Sleep call for process: firefox.exe modified
                                                                                                                                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                      34.117.188.166file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                        http://www.aieov.com/setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                  me.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                    darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                      darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousAmadey, StealcBrowse
                                                                                                                                                                                                                                                                                          34.149.100.209file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                            http://www.aieov.com/setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                      me.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                        darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                          darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                            http://origin0701.k-mil.net/makers/official_url?m=4293&u=https://quickinaction.click/all284372166724447/284372166724447#ZHdpZ2h0X3Njb3R0QG91dGxvb2suY29t==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                              34.160.144.191file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                http://www.aieov.com/setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                    file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                          me.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                            darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                              darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                file.exeGet hashmaliciousAmadey, StealcBrowse
                                                                                                                                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                  example.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  http://www.aieov.com/setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  me.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousAmadey, StealcBrowse
                                                                                                                                                                                                                                                                                                                                  • 93.184.215.14
                                                                                                                                                                                                                                                                                                                                  twitter.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  • 104.244.42.193
                                                                                                                                                                                                                                                                                                                                  star-mini.c10r.facebook.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.252.35
                                                                                                                                                                                                                                                                                                                                  http://kendellseafoods.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.253.35
                                                                                                                                                                                                                                                                                                                                  DocuSign-Docx.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.253.35
                                                                                                                                                                                                                                                                                                                                  https://issuu.com/smart_media/docs/die_welt_wirtschaft/19Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.251.35
                                                                                                                                                                                                                                                                                                                                  High Court Summons Notice.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.253.35
                                                                                                                                                                                                                                                                                                                                  http://patjimmy323.wixsite.com/my-site-1/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.251.35
                                                                                                                                                                                                                                                                                                                                  https://coisunibaseaiusignin.gitbook.io/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.253.35
                                                                                                                                                                                                                                                                                                                                  http://uppholldbcloginn.gitbook.io/us/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.253.35
                                                                                                                                                                                                                                                                                                                                  http://stonemartin1001.wixsite.com/sky-result/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.251.35
                                                                                                                                                                                                                                                                                                                                  http://ashleyproberts.wixsite.com/my-site/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 157.240.0.35
                                                                                                                                                                                                                                                                                                                                  services.addons.mozilla.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.23
                                                                                                                                                                                                                                                                                                                                  http://www.aieov.com/setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.23
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.80
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.120
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.120
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.80
                                                                                                                                                                                                                                                                                                                                  me.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 18.65.39.4
                                                                                                                                                                                                                                                                                                                                  darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.120
                                                                                                                                                                                                                                                                                                                                  darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousAmadey, StealcBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.23
                                                                                                                                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                  GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.188.166
                                                                                                                                                                                                                                                                                                                                  High Court Summons Notice.pdfGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.162.98
                                                                                                                                                                                                                                                                                                                                  http://pub-f3922f20d4c74ba1869fd3db906e3295.r2.dev/gsecondcheck.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.59.81
                                                                                                                                                                                                                                                                                                                                  http://jamesfortune619.wixsite.com/my-site-4/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.77.79
                                                                                                                                                                                                                                                                                                                                  http://emaildlatt-mailcom-28e2uy93.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.77.79
                                                                                                                                                                                                                                                                                                                                  http://pan4477.onrender.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.59.81
                                                                                                                                                                                                                                                                                                                                  https://wtm.entree-plat-dessert.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 hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.132.248
                                                                                                                                                                                                                                                                                                                                  licarisan_api.exeGet hashmaliciousIcarusBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.59.81
                                                                                                                                                                                                                                                                                                                                  build.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.59.81
                                                                                                                                                                                                                                                                                                                                  https://s3.amazonaws.com/r3e1272/Rco.html#4eyOul3510eTKK19nejdimaazo189TBUDIERNFIMTFBQ264510CRSG907S11Get hashmaliciousPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.117.39.58
                                                                                                                                                                                                                                                                                                                                  ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  http://xdr.euw31usea1-carbonhelixbytedandomaincontrolpanele-for-github.sentinelone.net/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.36.213.229
                                                                                                                                                                                                                                                                                                                                  cenSXPimaG.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                                                                                                                                  • 51.250.99.224
                                                                                                                                                                                                                                                                                                                                  2UngC9fiGa.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                                                                                                                                  • 48.131.111.170
                                                                                                                                                                                                                                                                                                                                  XvAqhy3FO6.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                                                                                                                                  • 51.65.109.90
                                                                                                                                                                                                                                                                                                                                  970Qh1XiFt.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.44.37.101
                                                                                                                                                                                                                                                                                                                                  x86.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                                                                                                                  • 57.10.146.234
                                                                                                                                                                                                                                                                                                                                  https://issuu.com/smart_media/docs/die_welt_wirtschaft/19Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.36.216.150
                                                                                                                                                                                                                                                                                                                                  Portal.msiGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.128.163.126
                                                                                                                                                                                                                                                                                                                                  xd.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.187.79.97
                                                                                                                                                                                                                                                                                                                                  AMAZON-02UShttp://pay.christinagstewart.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 18.245.86.11
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.23
                                                                                                                                                                                                                                                                                                                                  https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.ht.zpdzwq?v=frudxdBjlfmjfqymhfwj.ht.pjd.kwjsy___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzpiNGZlZGFhNjcxOTBhYjU4MTE5MjBlZTRiYTAxZmUwMTo3OmIxYWM6MDg1ODNlNjljZDkwNThkM2ZiM2RjYTI4MzFjZGY4NGFmMTYyZTlhYmVjYWYxY2Q4MmNkZDhiNmFmOWVkOWUxOTpoOlQ6VA#Sm9hbi5LbmlwcGVuQEVsa2F5LkNvbQ==Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 108.138.7.53
                                                                                                                                                                                                                                                                                                                                  https://www.dropbox.com/scl/fi/qo6796ed7hlrt0v8k9nr6/Patagonia-Health-Barcode-Scanner-Setup-2024.exe?rlkey=5bmndvx8124ztopqewiogbnlt&st=yvxpokhf&dl=0Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.157.212.223
                                                                                                                                                                                                                                                                                                                                  https://login.stmarytx.edu/cas/logout?service=http%3A%2F%2Fgoogle.com%2Famp%2Fmatrikaengineeringworks.com/hebc/?#?m=bWVsaXNzYWdAd2Utd29ybGR3aWRlLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 54.70.225.16
                                                                                                                                                                                                                                                                                                                                  https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.hfdzwq?v=frudxdkniljyAkC.sEd.frl___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzo2MGY0ZmI3MTkzODQ4OWRiOGFlZjY2ODI4ODlkMDk3NDo3OmRlYjY6NjI5YzkxZjFmNmQ3ZjI1NWIxN2UwYTI5ZTNmZjcyMTQyNTg3NmZhMDQyOWZlMDI4MDhmODRlNWVhYWU3MjJhZDpoOlQ6VA#ZHN5aHJlQG9sZ29vbmlrLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 108.156.46.98
                                                                                                                                                                                                                                                                                                                                  https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.hfdzwq?v=frudxdkniljyAkC.sEd.frl___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzo2MGY0ZmI3MTkzODQ4OWRiOGFlZjY2ODI4ODlkMDk3NDo3OmRlYjY6NjI5YzkxZjFmNmQ3ZjI1NWIxN2UwYTI5ZTNmZjcyMTQyNTg3NmZhMDQyOWZlMDI4MDhmODRlNWVhYWU3MjJhZDpoOlQ6VA#ZHN5aHJlQG9sZ29vbmlrLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 108.138.7.20
                                                                                                                                                                                                                                                                                                                                  https://statics.teams.cdn.office.net/evergreen-assets/safelinks/1/atp-safelinks.html?url=https%3A%2F%2Fphpstack-1335745-4931432.cloudwaysapps.com%2F%23%26%26%2B~XanJlZEBwcm9hZy5jb20=&locale=en-us&dest=https%3A%2F%2Fteams.microsoft.com%2Fapi%2Fmt%2Fpart%2Famer-03%2Fbeta%2Fatpsafelinks%2Fgeturlreputationsitev2%2F&pc=dqIG3sYngZE8N2eRBkF7CAkOWKg5g3tGjnQGJGQlc61U8QGlKCs5AzH6JKtW7FyetS1g5oEXSNBKJVlJbTCgrea0O041dBSjafsPfOc5KxbMkQRnpwalZQdhHfcjoeWL7rzuDGG%252fj2e7scaAUTCy2PY0WmBb87rgNNPdmEQne%252f00jq9aOpwCvhJrGkNK5f8MP5jaUwccFhr9IIoVaCOrXUhSnuRv%252fw%252bxhUGpneOsAgBs7CjJQbmepBIHfEqwCkqvDbYbxYB4Hm9sLVAOFaz9VFMFSXPJt4MqeWAChikWLAZATmvniptR3h97WVF%252fZtjtm3RxdNyPROzhUvL92w9fdWmSw%252bHBxn5rMHOUpaQU16ZpcfATiVaU51fqKaYO2v4ZnK7axAavLgOpgAJivuE6JO2sqksPH41Z6PVam5c4J%252bwwz5Z2pqrOSxPxEcPGeDff%252bxp9PApNxpvURRLl98WzRw%252ftZEOu%252foKPhjN0OiTGAQDLRWTF%252bMCzSQg37tk7ZYUYYc0Ycs4xDjchhFprJCCSfrZ8WyHq6cjqmnbgDKRQig28xGNFnSDEeWMDBQeeeVyNqDv0FAAxkSAMO%252b7t4Qu1y0h0MHJYEb5pxfOYe8Pyfcsn7pyR%252fkKEqziEQVGlIETrpjVMNyrhJrnX9S%252flWaxf0H3tD%252fqMhzPysO9QdPSJTG054WE4jq5GRqTKu8P25t4KJLY15Oz2j5iCg7Bd5lczhgv4PQevplLuCGckM%252fs5EPk2r2FkSOxHF51EB5FR2TgXQR5UAp2BbaWTm9irKwSSUK5z1MsGMDokVMEB4bQ9mpZrl1%252bDMixJ1mQyyLXpelmEyN8zw1nTsbXAvDQgIvPLPj0QUtphEMnmVEXMkQHiw2WHWUSxIxYcY%252fltyp6bnMrankPAnpChbWQmk95rKsUz8tqtLjNDclK1y1FLy%252fh7sed9duxDDFupXnhmXxGJOmUV6FG1arxXL8urm1F98thG8anfchv3DafKsyVHHgmdUFNH6Uhcu4sB8fo0kqm2y7IWS96w5BeG334JvnFDJPLDPvtK5ojeXfDXh%252boKJdBxXGC9NmPwgDp8XeOavQnNlJRfUAXkhukdjDg1EHGF%252b9luUuTH%252fEbKHniTzx4OvIWUnDvXcdpuEIAnW8mDJzMXpmxpl3nwtTqeQWMeSNzjute9yTZEU%252beQk498EMyU%252fuPUg%252fSOH5r%252fwjGCsPpm%252f%252bUA00SsNvWuDD0AbNIKYubFuNKQ3SX6N7M11wOksoUG%252fz9IheWtOawwl7F0lqN3xkTQhfiiHovdudAPiB%252fzt25Im27XxPQ9s1c%252bnOWOPh6m%252bvaCQcj6bcwkFbNl5Y1KL7XQvirYSFsNXnrYuQvTPMk1n5CRq6dxsl9FRGV9MMdrZduC%252bG4B0zxLA58d8fTW2zfEXnRcMTgQKLK%252fmeZT7K3wwAvQiA%253d%253d%3B%20expires%3DWed%2C%2009%20Oct%202024%2014%3A05%3A23%20GMT%3B%20path%3D%2F%3B%20SameSite%3DNone%3B%20secuGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.217.68.4
                                                                                                                                                                                                                                                                                                                                  https://s.craft.me/yB5midhwwaHUPWGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 52.37.179.159
                                                                                                                                                                                                                                                                                                                                  FW_ _EXTERNAL_ Completed_ iNH9Y_Contract_and_Agreement_3509750318S REF ID_iNH9Y.msgGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 108.156.46.59
                                                                                                                                                                                                                                                                                                                                  ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  http://xdr.euw31usea1-carbonhelixbytedandomaincontrolpanele-for-github.sentinelone.net/Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.36.213.229
                                                                                                                                                                                                                                                                                                                                  cenSXPimaG.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                                                                                                                                  • 51.250.99.224
                                                                                                                                                                                                                                                                                                                                  2UngC9fiGa.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                                                                                                                                  • 48.131.111.170
                                                                                                                                                                                                                                                                                                                                  XvAqhy3FO6.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                                                                                                                                  • 51.65.109.90
                                                                                                                                                                                                                                                                                                                                  970Qh1XiFt.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.44.37.101
                                                                                                                                                                                                                                                                                                                                  x86.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                                                                                                                  • 57.10.146.234
                                                                                                                                                                                                                                                                                                                                  https://issuu.com/smart_media/docs/die_welt_wirtschaft/19Get hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.36.216.150
                                                                                                                                                                                                                                                                                                                                  Portal.msiGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.128.163.126
                                                                                                                                                                                                                                                                                                                                  xd.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                                                                                                                                                                                                  • 34.187.79.97
                                                                                                                                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                  fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  me.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  file.exeGet hashmaliciousAmadey, StealcBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  7U5e5iJPJ0.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                  • 35.244.181.201
                                                                                                                                                                                                                                                                                                                                  • 34.149.100.209
                                                                                                                                                                                                                                                                                                                                  • 34.160.144.191
                                                                                                                                                                                                                                                                                                                                  • 34.120.208.123
                                                                                                                                                                                                                                                                                                                                  • 52.222.236.48
                                                                                                                                                                                                                                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                                                                                                                                                  C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\bhsw2cld.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                                                                                                                    http://www.aieov.com/setup.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                        file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                          file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                              me.zipGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                                                                                                                                                                darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                                  darkreader-chrome.zipGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                                    http://origin0701.k-mil.net/makers/official_url?m=4293&u=https://quickinaction.click/all284372166724447/284372166724447#ZHdpZ2h0X3Njb3R0QG91dGxvb2suY29t==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):8056
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):5.178344108972574
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:192:1LKMX2wjcbhbVbTbfbRbObtbyEl7nZWFr6JA6unSrDtTkdBSlj:1LPXcNhnzFSJMrJ1nSrDhkdBuj
                                                                                                                                                                                                                                                                                                                                                      MD5:A64D22D630A82B2E8CDA4E306D30B93C
                                                                                                                                                                                                                                                                                                                                                      SHA1:AFB59B52BD9959F2DB43DF1148BEAA83F2607827
                                                                                                                                                                                                                                                                                                                                                      SHA-256:31D7A0B98199F136679C287C9FE940D070434FFA4CF9F0C352582A09D3CC6FB9
                                                                                                                                                                                                                                                                                                                                                      SHA-512:EDCCC8F95B7E2736C77A617611CE85F971CBCD237CF1F6A0BDEDF751E82A09F05AA24821D02B8DEF3EE1E5A80DC52000814623416D813C9EC3D607F7EE83C345
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Reputation:low
                                                                                                                                                                                                                                                                                                                                                      Preview:{"type":"uninstall","id":"d3450d45-af27-4057-91d8-01ac5afd9f15","creationDate":"2024-10-08T00:15:59.420Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"73d066a5-c100-48bf-b029-480dc6f75d78","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):8056
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):5.178344108972574
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:192:1LKMX2wjcbhbVbTbfbRbObtbyEl7nZWFr6JA6unSrDtTkdBSlj:1LPXcNhnzFSJMrJ1nSrDhkdBuj
                                                                                                                                                                                                                                                                                                                                                      MD5:A64D22D630A82B2E8CDA4E306D30B93C
                                                                                                                                                                                                                                                                                                                                                      SHA1:AFB59B52BD9959F2DB43DF1148BEAA83F2607827
                                                                                                                                                                                                                                                                                                                                                      SHA-256:31D7A0B98199F136679C287C9FE940D070434FFA4CF9F0C352582A09D3CC6FB9
                                                                                                                                                                                                                                                                                                                                                      SHA-512:EDCCC8F95B7E2736C77A617611CE85F971CBCD237CF1F6A0BDEDF751E82A09F05AA24821D02B8DEF3EE1E5A80DC52000814623416D813C9EC3D607F7EE83C345
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Reputation:low
                                                                                                                                                                                                                                                                                                                                                      Preview:{"type":"uninstall","id":"d3450d45-af27-4057-91d8-01ac5afd9f15","creationDate":"2024-10-08T00:15:59.420Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"73d066a5-c100-48bf-b029-480dc6f75d78","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):32768
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                                                                                                                                                                      MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                                                                                                                                                                      SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                                                                                                                                                                      SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                                                                                                                                                                      SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Reputation:high, very likely benign file
                                                                                                                                                                                                                                                                                                                                                      Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):453023
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):7.997718157581587
                                                                                                                                                                                                                                                                                                                                                      Encrypted:true
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                                                                                                                                                                      MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                                                                                                                                                                      SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                                                                                                                                                                      SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                                                                                                                                                                      SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):6150
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.938062539650255
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:192:dLFS+OuPUkOdwiOdEiooslH5jV/ZiwBhZ0Xj3L/A8P:HFMXihslH5jVhiwBrA
                                                                                                                                                                                                                                                                                                                                                      MD5:2A45F4D2038B20D7D9B2D927C88A29AA
                                                                                                                                                                                                                                                                                                                                                      SHA1:7F6977F3F0A3BB7D93DAB35D8D311A03136DF0E6
                                                                                                                                                                                                                                                                                                                                                      SHA-256:A3A3EAF2DFDAC8F9F15351332AAE4FABC21CB08F4E1CB30100D2D4555B3BC647
                                                                                                                                                                                                                                                                                                                                                      SHA-512:893F33CAC0887931CB75A190E9520468FFA6F4068DA5EB89A67C8F4C761FB9C46CD8723E66D99C96D5BBB1A787581F181D300297598BC99C305BE6A89914E622
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"bookmarks-toolbar-default-on":{"slug":"bookmarks-toolbar-default-on","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{},"enabled":true,"featureId":"bookmarks"}]},"active":true,"enrollmentId":"7bc86eac-c05c-4545-a5e5-03a2503c064a","experimentType":"nimbus","source":"rs-loader","userFacingName":"Bookmarks Toolbar Default On","userFacingDescription":"An experiment that turns the bookmarks toolbar on by default.","lastSeen":"2023-10-05T10:58:21.623Z","featureIds":["bookmarks"],"prefs":[],"isRollout":false},"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"cd0a25e7-ded7-4f19-86ce-bb010938a092","experimentType":"r
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):6150
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.938062539650255
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:192:dLFS+OuPUkOdwiOdEiooslH5jV/ZiwBhZ0Xj3L/A8P:HFMXihslH5jVhiwBrA
                                                                                                                                                                                                                                                                                                                                                      MD5:2A45F4D2038B20D7D9B2D927C88A29AA
                                                                                                                                                                                                                                                                                                                                                      SHA1:7F6977F3F0A3BB7D93DAB35D8D311A03136DF0E6
                                                                                                                                                                                                                                                                                                                                                      SHA-256:A3A3EAF2DFDAC8F9F15351332AAE4FABC21CB08F4E1CB30100D2D4555B3BC647
                                                                                                                                                                                                                                                                                                                                                      SHA-512:893F33CAC0887931CB75A190E9520468FFA6F4068DA5EB89A67C8F4C761FB9C46CD8723E66D99C96D5BBB1A787581F181D300297598BC99C305BE6A89914E622
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"bookmarks-toolbar-default-on":{"slug":"bookmarks-toolbar-default-on","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{},"enabled":true,"featureId":"bookmarks"}]},"active":true,"enrollmentId":"7bc86eac-c05c-4545-a5e5-03a2503c064a","experimentType":"nimbus","source":"rs-loader","userFacingName":"Bookmarks Toolbar Default On","userFacingDescription":"An experiment that turns the bookmarks toolbar on by default.","lastSeen":"2023-10-05T10:58:21.623Z","featureIds":["bookmarks"],"prefs":[],"isRollout":false},"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"cd0a25e7-ded7-4f19-86ce-bb010938a092","experimentType":"r
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:Mozilla lz4 compressed data, originally 22422 bytes
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):5317
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):6.6001890334338125
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:96:z2YbKsKNU2xWrp327tGmD4wBON6h6cHAHJVauvjZHjkTymdS1/qTMg6q+m:zTx2x2t0FDJ4NpkuvjdeplTMHm
                                                                                                                                                                                                                                                                                                                                                      MD5:BB43EF1E7A5E32AB89416BF2B4856129
                                                                                                                                                                                                                                                                                                                                                      SHA1:FB32DEEB5BAC138A427FFD4728327A68E18FAD82
                                                                                                                                                                                                                                                                                                                                                      SHA-256:FFA8720630B79E63B854F6EB1C17BFEC588294DF4C87EACC2FF1DC80DDC7CF0A
                                                                                                                                                                                                                                                                                                                                                      SHA-512:AA1CC532C583C70EA2332E19D261B3CE13C159B11DBC0D7DD9BE38594BE6060A30929ECA0B1938498A5A271BE4772E78B75CB9BD4D52D33DE094182DF52DCB10
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:mozLz40..W....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:Mozilla lz4 compressed data, originally 22422 bytes
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):5317
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):6.6001890334338125
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:96:z2YbKsKNU2xWrp327tGmD4wBON6h6cHAHJVauvjZHjkTymdS1/qTMg6q+m:zTx2x2t0FDJ4NpkuvjdeplTMHm
                                                                                                                                                                                                                                                                                                                                                      MD5:BB43EF1E7A5E32AB89416BF2B4856129
                                                                                                                                                                                                                                                                                                                                                      SHA1:FB32DEEB5BAC138A427FFD4728327A68E18FAD82
                                                                                                                                                                                                                                                                                                                                                      SHA-256:FFA8720630B79E63B854F6EB1C17BFEC588294DF4C87EACC2FF1DC80DDC7CF0A
                                                                                                                                                                                                                                                                                                                                                      SHA-512:AA1CC532C583C70EA2332E19D261B3CE13C159B11DBC0D7DD9BE38594BE6060A30929ECA0B1938498A5A271BE4772E78B75CB9BD4D52D33DE094182DF52DCB10
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:mozLz40..W....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):24
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                                                                                                                      MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                                                                                                                      SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                                                                                                                      SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                                                                                                                      SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):24
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                                                                                                                                      MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                                                                                                                                      SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                                                                                                                                      SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                                                                                                                                      SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):262144
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):0.04905391753567332
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:24:DLivwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:D6wae+QtMImelekKDa5
                                                                                                                                                                                                                                                                                                                                                      MD5:DD9D28E87ED57D16E65B14501B4E54D1
                                                                                                                                                                                                                                                                                                                                                      SHA1:793839B47326441BE2D1336BA9A61C9B948C578D
                                                                                                                                                                                                                                                                                                                                                      SHA-256:BB4E6C58C50BD6399ED70468C02B584595C29F010B66F864CD4D6B427FA365BC
                                                                                                                                                                                                                                                                                                                                                      SHA-512:A2626F6A3CBADE62E38DA5987729D99830D0C6AA134D4A9E615026A5F18ACBB11A2C3C80917DAD76DA90ED5BAA9B0454D4A3C2DD04436735E78C974BA1D035B1
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):66
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                                                                                                                      MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                                                                                                                      SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                                                                                                                      SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                                                                                                                      SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):66
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                                                                                                                                      MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                                                                                                                                      SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                                                                                                                                      SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                                                                                                                                      SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):36830
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):5.1853922070675935
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:768:YI4dvfBXf4H6J4/4nN4O4amoavf4w4lB484QS4S4T:Y9mtvq
                                                                                                                                                                                                                                                                                                                                                      MD5:A51B8E1B0ED704E954E172A7E926B5A6
                                                                                                                                                                                                                                                                                                                                                      SHA1:EE8C7A958C82763917A79E242C76932B887759D8
                                                                                                                                                                                                                                                                                                                                                      SHA-256:C4778491FA50712379FB7482F4D5F609EE0613A95E1ABCEDD9F6DE3302832C66
                                                                                                                                                                                                                                                                                                                                                      SHA-512:D81C254A47EBE59CF4943EA1100CD688B45257B2D20AEE59BC0A8251B3BF1894F85B80248FA60259DD051819B7C4B68182D0AFD30ADFAD311042B3F131C8AF25
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{8defec20-1d2a-4e92-a8ca-6ec63d483a92}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):36830
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):5.1853922070675935
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:768:YI4dvfBXf4H6J4/4nN4O4amoavf4w4lB484QS4S4T:Y9mtvq
                                                                                                                                                                                                                                                                                                                                                      MD5:A51B8E1B0ED704E954E172A7E926B5A6
                                                                                                                                                                                                                                                                                                                                                      SHA1:EE8C7A958C82763917A79E242C76932B887759D8
                                                                                                                                                                                                                                                                                                                                                      SHA-256:C4778491FA50712379FB7482F4D5F609EE0613A95E1ABCEDD9F6DE3302832C66
                                                                                                                                                                                                                                                                                                                                                      SHA-512:D81C254A47EBE59CF4943EA1100CD688B45257B2D20AEE59BC0A8251B3BF1894F85B80248FA60259DD051819B7C4B68182D0AFD30ADFAD311042B3F131C8AF25
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{8defec20-1d2a-4e92-a8ca-6ec63d483a92}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):32768
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                                                                                                                                                                      MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                                                                                                                                                                      SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                                                                                                                                                                      SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                                                                                                                                                                      SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):1021904
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                                                                                                                      MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                                                                                                                      SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                                                                                                                      SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                                                                                                                      SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                                                                                                                      Joe Sandbox View:
                                                                                                                                                                                                                                                                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      • Filename: , Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      • Filename: me.zip, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      • Filename: darkreader-chrome.zip, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      • Filename: darkreader-chrome.zip, Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      • Filename: , Detection: malicious, Browse
                                                                                                                                                                                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):1021904
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                                                                                                                                      MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                                                                                                                                      SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                                                                                                                                      SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                                                                                                                                      SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Antivirus:
                                                                                                                                                                                                                                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:ASCII text
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):116
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                                                                                                                      MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                                                                                                                      SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                                                                                                                      SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                                                                                                                      SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:ASCII text
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):116
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                                                                                                                                      MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                                                                                                                                      SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                                                                                                                                      SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                                                                                                                                      SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):98304
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):0.07326826949284501
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zkiYt:DLhesh7Owd4+jiI
                                                                                                                                                                                                                                                                                                                                                      MD5:80C0FAE2D539307046AD9BFBC12F8DC4
                                                                                                                                                                                                                                                                                                                                                      SHA1:0D9CD0E03F0515E48EECCEDF636B56F63E326A40
                                                                                                                                                                                                                                                                                                                                                      SHA-256:F084767687E5E306116BB712BD0B1D6B51DAD68D48A020F4B818E20DE333E938
                                                                                                                                                                                                                                                                                                                                                      SHA-512:A858582890CE730AB9404494AF80EE825D24234D299C09C3C2EAA7B26AFA14AFEF8E0B62F5772DCC5AD2B0252600C31719B54F3861BC7FB84726E347929F9954
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):32768
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):0.035577876577226504
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:GtlstF+4tbhQmYlstF+4tbhQc/L89//alEl:GtWt84YmYWt84YcD89XuM
                                                                                                                                                                                                                                                                                                                                                      MD5:62B3D6A933F260EF0618BEBC8212F03D
                                                                                                                                                                                                                                                                                                                                                      SHA1:BE94472B8837DCDA4BD3B480DC42C7B99747BA12
                                                                                                                                                                                                                                                                                                                                                      SHA-256:3C41EE5807AA78DF92B99570D355151DCDB72A36421F73B7ADC5F32D1B8D7974
                                                                                                                                                                                                                                                                                                                                                      SHA-512:F1C6B61CD49EA0622C292EAAD7669EF4A3C7B258737FC900C4E22BC067C645D770E9BA5C93E1D8220E41722C3BE9CAD687E242ACF0E869780C98881E28F5AFC1
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:..-......................c......w.>.........G..-......................c......w.>.........G........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):32824
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):0.03992025326209769
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:Ol12Gw+Mtla3zSdKx9GZ0tl8rEXsxdwhml8XW3R2:KIv4DSgLGKl8dMhm93w
                                                                                                                                                                                                                                                                                                                                                      MD5:7B0BDE7FAEFCF5FCD6187A8BA4FBF386
                                                                                                                                                                                                                                                                                                                                                      SHA1:FEFDD73E0F8E9B1F2B8BC034975FE036F544DC50
                                                                                                                                                                                                                                                                                                                                                      SHA-256:6D8A5772E2EB086CEFFAFCD4C57ED50BB7AB1C0C4E841E2C5EFFE93C8C35CA09
                                                                                                                                                                                                                                                                                                                                                      SHA-512:A15234B95860F69C1969A11722C748D18D0F5871A445A77DBFDC641DBC9AF5151FEC444426D4ACF5578BA50A1CAA92B1F420A2B1153D20DD58A82B718644AADD
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:7....-...........w.>.....z...:(.........w.>....c....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:ASCII text, with very long lines (1765), with CRLF line terminators
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):13990
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):5.4697662512717455
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:192:ntngRHsE1ibqp6GPQ77QCVUgaXp6iP+K/4a3T5R3NBw8dSkSl:nnAZQPQCVUeiPbV/fwtk0
                                                                                                                                                                                                                                                                                                                                                      MD5:0D17918B9672B1A09DABC81D017D8058
                                                                                                                                                                                                                                                                                                                                                      SHA1:744D50058FAA306F0F8D68A6155A259DFD75469D
                                                                                                                                                                                                                                                                                                                                                      SHA-256:A11007FF3C7DB8E4549D2D42136E4DA3E9413A231C951894FDA1F7FDEB321AC9
                                                                                                                                                                                                                                                                                                                                                      SHA-512:EC0FA1F2369F07AC5E7DFB128C75E4C6D5AF93AA5751175F307AEBF4A30608201C9F0EA5479A1C0E2F9D051C332A74676F6EBD19C49C3733371920EDA7A26EA3
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "4cbb0eca-22b0-45bf-8c7b-17c3580947ca");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1728346529);..user_pref("app.update.lastUpdateTime.background-update-timer", 1728346529);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1728346529);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 172834
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:ASCII text, with very long lines (1765), with CRLF line terminators
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):13990
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):5.4697662512717455
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:192:ntngRHsE1ibqp6GPQ77QCVUgaXp6iP+K/4a3T5R3NBw8dSkSl:nnAZQPQCVUeiPbV/fwtk0
                                                                                                                                                                                                                                                                                                                                                      MD5:0D17918B9672B1A09DABC81D017D8058
                                                                                                                                                                                                                                                                                                                                                      SHA1:744D50058FAA306F0F8D68A6155A259DFD75469D
                                                                                                                                                                                                                                                                                                                                                      SHA-256:A11007FF3C7DB8E4549D2D42136E4DA3E9413A231C951894FDA1F7FDEB321AC9
                                                                                                                                                                                                                                                                                                                                                      SHA-512:EC0FA1F2369F07AC5E7DFB128C75E4C6D5AF93AA5751175F307AEBF4A30608201C9F0EA5479A1C0E2F9D051C332A74676F6EBD19C49C3733371920EDA7A26EA3
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "4cbb0eca-22b0-45bf-8c7b-17c3580947ca");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1728346529);..user_pref("app.update.lastUpdateTime.background-update-timer", 1728346529);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1728346529);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 172834
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):65536
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:6:ltBl/l4/WN1h4BEJYqWvLue3FMOrMZ0l:DBl/WuntfJiFxMZO
                                                                                                                                                                                                                                                                                                                                                      MD5:18F65713B07CB441E6A98655B726D098
                                                                                                                                                                                                                                                                                                                                                      SHA1:2CEFA32BC26B25BE81C411B60C9925CB0F1F8F88
                                                                                                                                                                                                                                                                                                                                                      SHA-256:B6C268E48546B113551A5AF9CA86BB6A462A512DE6C9289315E125CEB0FD8621
                                                                                                                                                                                                                                                                                                                                                      SHA-512:A6871076C7D7ED53B630F9F144ED04303AD54A2E60B94ECA2AA96964D1AB375EEFDCA86CE0D3EB0E9DBB81470C6BD159877125A080C95EB17E54A52427F805FB
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):493
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.973190911575987
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:12:YZFggEW4+HcIVHlW8cOlZGV1AQIYzvZcyBuLZnFsXan:YR4OcSlCOlZGV1AQIWZcy6ZCq
                                                                                                                                                                                                                                                                                                                                                      MD5:040D10DC91DCB95A826928C94A142C6A
                                                                                                                                                                                                                                                                                                                                                      SHA1:5B4C236883D86F6D806616284601AC927468DAE8
                                                                                                                                                                                                                                                                                                                                                      SHA-256:70268F4F862B902D918A1F3AFCBF22265628D5439E9C33B5689CF54DA5C6B198
                                                                                                                                                                                                                                                                                                                                                      SHA-512:9942366F1D3B49E2451399E915532B0ABD4E21A99B7B09C671D5411CC980BE6F1818C89C9B21499C260F056379C66140B0C4D4C27CE32CC766AB839DCDAF9AF5
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"type":"health","id":"07134cc5-5a30-4414-8d77-09b523f924b2","creationDate":"2024-10-08T00:16:00.142Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"os":{"name":"WINNT","version":"10.0"},"reason":"immediate","sendFailure":{"eUnreachable":1}},"clientId":"73d066a5-c100-48bf-b029-480dc6f75d78"}
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:modified
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):493
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.973190911575987
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:12:YZFggEW4+HcIVHlW8cOlZGV1AQIYzvZcyBuLZnFsXan:YR4OcSlCOlZGV1AQIWZcy6ZCq
                                                                                                                                                                                                                                                                                                                                                      MD5:040D10DC91DCB95A826928C94A142C6A
                                                                                                                                                                                                                                                                                                                                                      SHA1:5B4C236883D86F6D806616284601AC927468DAE8
                                                                                                                                                                                                                                                                                                                                                      SHA-256:70268F4F862B902D918A1F3AFCBF22265628D5439E9C33B5689CF54DA5C6B198
                                                                                                                                                                                                                                                                                                                                                      SHA-512:9942366F1D3B49E2451399E915532B0ABD4E21A99B7B09C671D5411CC980BE6F1818C89C9B21499C260F056379C66140B0C4D4C27CE32CC766AB839DCDAF9AF5
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"type":"health","id":"07134cc5-5a30-4414-8d77-09b523f924b2","creationDate":"2024-10-08T00:16:00.142Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"os":{"name":"WINNT","version":"10.0"},"reason":"immediate","sendFailure":{"eUnreachable":1}},"clientId":"73d066a5-c100-48bf-b029-480dc6f75d78"}
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):90
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                                                                                                                      MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                                                                                                                      SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                                                                                                                      SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                                                                                                                      SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):90
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                                                                                                                                      MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                                                                                                                                      SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                                                                                                                                      SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                                                                                                                                      SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):1569
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):6.331694921872974
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:24:v+USUGlcAxSPHLXnIgaK/pnxQwRlszT5sKpL8H3eHVPGVXTK6amhujJXXYzOBaFs:GUpOx+PnR6RC3eQZTK64JHaTv4/f
                                                                                                                                                                                                                                                                                                                                                      MD5:C330866B130C07328120845D62A1C3E3
                                                                                                                                                                                                                                                                                                                                                      SHA1:896FE0795AA2BB7FA1CC7258A784C4953297B6BB
                                                                                                                                                                                                                                                                                                                                                      SHA-256:5E80807C31B6FA342B0B840BBD4C77627114FEA8341EBB61745DDA489BB89E96
                                                                                                                                                                                                                                                                                                                                                      SHA-512:8EAA193D4BC5BB1CA769ED2AA06FEF211268375263E2EE4FF302F7D53AFAAB1E31F8F46EE259B565F7B6ACB6A34B952500E064E6682437E1E259C73A3C53303D
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{a136fefd-398d-402a-a220-5181a6411791}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1728346533622,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...901dfca9-0933-49dd-b8ad-c128d9fd5ae7","zD..1...Wm..l........j..:....1":{..mUpdate...startTim..`499128...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A51e19de0ffa8528fa1d4335ed7f73fa3f4df6437c31aaee3b1be0ea3fc874673","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...05457,"originA...."
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):1569
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):6.331694921872974
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:24:v+USUGlcAxSPHLXnIgaK/pnxQwRlszT5sKpL8H3eHVPGVXTK6amhujJXXYzOBaFs:GUpOx+PnR6RC3eQZTK64JHaTv4/f
                                                                                                                                                                                                                                                                                                                                                      MD5:C330866B130C07328120845D62A1C3E3
                                                                                                                                                                                                                                                                                                                                                      SHA1:896FE0795AA2BB7FA1CC7258A784C4953297B6BB
                                                                                                                                                                                                                                                                                                                                                      SHA-256:5E80807C31B6FA342B0B840BBD4C77627114FEA8341EBB61745DDA489BB89E96
                                                                                                                                                                                                                                                                                                                                                      SHA-512:8EAA193D4BC5BB1CA769ED2AA06FEF211268375263E2EE4FF302F7D53AFAAB1E31F8F46EE259B565F7B6ACB6A34B952500E064E6682437E1E259C73A3C53303D
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{a136fefd-398d-402a-a220-5181a6411791}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1728346533622,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...901dfca9-0933-49dd-b8ad-c128d9fd5ae7","zD..1...Wm..l........j..:....1":{..mUpdate...startTim..`499128...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A51e19de0ffa8528fa1d4335ed7f73fa3f4df6437c31aaee3b1be0ea3fc874673","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...05457,"originA...."
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):1569
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):6.331694921872974
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:24:v+USUGlcAxSPHLXnIgaK/pnxQwRlszT5sKpL8H3eHVPGVXTK6amhujJXXYzOBaFs:GUpOx+PnR6RC3eQZTK64JHaTv4/f
                                                                                                                                                                                                                                                                                                                                                      MD5:C330866B130C07328120845D62A1C3E3
                                                                                                                                                                                                                                                                                                                                                      SHA1:896FE0795AA2BB7FA1CC7258A784C4953297B6BB
                                                                                                                                                                                                                                                                                                                                                      SHA-256:5E80807C31B6FA342B0B840BBD4C77627114FEA8341EBB61745DDA489BB89E96
                                                                                                                                                                                                                                                                                                                                                      SHA-512:8EAA193D4BC5BB1CA769ED2AA06FEF211268375263E2EE4FF302F7D53AFAAB1E31F8F46EE259B565F7B6ACB6A34B952500E064E6682437E1E259C73A3C53303D
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{a136fefd-398d-402a-a220-5181a6411791}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1728346533622,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...901dfca9-0933-49dd-b8ad-c128d9fd5ae7","zD..1...Wm..l........j..:....1":{..mUpdate...startTim..`499128...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A51e19de0ffa8528fa1d4335ed7f73fa3f4df6437c31aaee3b1be0ea3fc874673","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...05457,"originA...."
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):4096
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                                                                                                                                                                      MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                                                                                                                                                                      SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                                                                                                                                                                      SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                                                                                                                                                                      SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):4537
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):5.030795329643462
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:48:YrSAY/jhUQZpExB1+anOqW5VhpZVjWKzzc8cyYMsku7f86SLAVL7sKsM5FtsfAct:yc/5TEr5i+Kzzczvbw6KkMKXrc2Rn27
                                                                                                                                                                                                                                                                                                                                                      MD5:51EFB02E959F829A89063D9005B165BA
                                                                                                                                                                                                                                                                                                                                                      SHA1:24516B8590E24D62151D2239C861A1A0262C6B56
                                                                                                                                                                                                                                                                                                                                                      SHA-256:39464F651359A5AA6095B5D6EED80314E64CBBE3C129F0C05211AD5F944FFD67
                                                                                                                                                                                                                                                                                                                                                      SHA-512:3527ABCCF17E54DC238B557BDB649752C53A6EDA764BA45A85981A9AC810420D5A98CC42C31F9A3069191F89E155D6438A003527EB2928F69F86B77C584ED055
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-08T00:15:08.212Z","profileAgeCreated":1696503493780,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                                                                                                                      Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      File Type:JSON data
                                                                                                                                                                                                                                                                                                                                                      Category:dropped
                                                                                                                                                                                                                                                                                                                                                      Size (bytes):4537
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):5.030795329643462
                                                                                                                                                                                                                                                                                                                                                      Encrypted:false
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:48:YrSAY/jhUQZpExB1+anOqW5VhpZVjWKzzc8cyYMsku7f86SLAVL7sKsM5FtsfAct:yc/5TEr5i+Kzzczvbw6KkMKXrc2Rn27
                                                                                                                                                                                                                                                                                                                                                      MD5:51EFB02E959F829A89063D9005B165BA
                                                                                                                                                                                                                                                                                                                                                      SHA1:24516B8590E24D62151D2239C861A1A0262C6B56
                                                                                                                                                                                                                                                                                                                                                      SHA-256:39464F651359A5AA6095B5D6EED80314E64CBBE3C129F0C05211AD5F944FFD67
                                                                                                                                                                                                                                                                                                                                                      SHA-512:3527ABCCF17E54DC238B557BDB649752C53A6EDA764BA45A85981A9AC810420D5A98CC42C31F9A3069191F89E155D6438A003527EB2928F69F86B77C584ED055
                                                                                                                                                                                                                                                                                                                                                      Malicious:false
                                                                                                                                                                                                                                                                                                                                                      Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-08T00:15:08.212Z","profileAgeCreated":1696503493780,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                                                                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                                                                                                                                      Entropy (8bit):6.583736000539422
                                                                                                                                                                                                                                                                                                                                                      TrID:
                                                                                                                                                                                                                                                                                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                                                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                                                                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                                                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                                                                                                                                      File name:file.exe
                                                                                                                                                                                                                                                                                                                                                      File size:919'040 bytes
                                                                                                                                                                                                                                                                                                                                                      MD5:9d7ea17aa6d8ec2653fbd07092d2a3d8
                                                                                                                                                                                                                                                                                                                                                      SHA1:87be9a5685f0cb4c5af2ee6edca095403c41a45e
                                                                                                                                                                                                                                                                                                                                                      SHA256:8178437df4f2521009fcf310fbcd17fd7a2084bb6e35cf0f5a52cf456f189a9b
                                                                                                                                                                                                                                                                                                                                                      SHA512:4ef98e2223501aa358ca9f37b1ad364f131c2b0456eb15efe8109bf0b1b8bedaa14429ab1ef300abe68891c0af93d5d44b51dd3f4824314be806809b62f56ebb
                                                                                                                                                                                                                                                                                                                                                      SSDEEP:12288:kqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga6Tw:kqDEvCTbMWu7rQYlBQcBiT6rprG8aKw
                                                                                                                                                                                                                                                                                                                                                      TLSH:A2159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                                                                                                                                                                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                                                                                                                                                                      Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                                                                                                                                                                      Entrypoint:0x420577
                                                                                                                                                                                                                                                                                                                                                      Entrypoint Section:.text
                                                                                                                                                                                                                                                                                                                                                      Digitally signed:false
                                                                                                                                                                                                                                                                                                                                                      Imagebase:0x400000
                                                                                                                                                                                                                                                                                                                                                      Subsystem:windows gui
                                                                                                                                                                                                                                                                                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                                                                                                                                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                                                                                                                                      Time Stamp:0x67046130 [Mon Oct 7 22:31:12 2024 UTC]
                                                                                                                                                                                                                                                                                                                                                      TLS Callbacks:
                                                                                                                                                                                                                                                                                                                                                      CLR (.Net) Version:
                                                                                                                                                                                                                                                                                                                                                      OS Version Major:5
                                                                                                                                                                                                                                                                                                                                                      OS Version Minor:1
                                                                                                                                                                                                                                                                                                                                                      File Version Major:5
                                                                                                                                                                                                                                                                                                                                                      File Version Minor:1
                                                                                                                                                                                                                                                                                                                                                      Subsystem Version Major:5
                                                                                                                                                                                                                                                                                                                                                      Subsystem Version Minor:1
                                                                                                                                                                                                                                                                                                                                                      Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                                                                                                                                                                      Instruction
                                                                                                                                                                                                                                                                                                                                                      call 00007FEAD0AF5273h
                                                                                                                                                                                                                                                                                                                                                      jmp 00007FEAD0AF4B7Fh
                                                                                                                                                                                                                                                                                                                                                      push ebp
                                                                                                                                                                                                                                                                                                                                                      mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                      push esi
                                                                                                                                                                                                                                                                                                                                                      push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                                                                                                      mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                      call 00007FEAD0AF4D5Dh
                                                                                                                                                                                                                                                                                                                                                      mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                                                                                                                                                                      mov eax, esi
                                                                                                                                                                                                                                                                                                                                                      pop esi
                                                                                                                                                                                                                                                                                                                                                      pop ebp
                                                                                                                                                                                                                                                                                                                                                      retn 0004h
                                                                                                                                                                                                                                                                                                                                                      and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                                                                                                                      mov eax, ecx
                                                                                                                                                                                                                                                                                                                                                      and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                                                                                                                      mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                                                                                                                                                                      mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                                                                                                                                                                      ret
                                                                                                                                                                                                                                                                                                                                                      push ebp
                                                                                                                                                                                                                                                                                                                                                      mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                      push esi
                                                                                                                                                                                                                                                                                                                                                      push dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                                                                                                      mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                      call 00007FEAD0AF4D2Ah
                                                                                                                                                                                                                                                                                                                                                      mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                                                                                                                                                                      mov eax, esi
                                                                                                                                                                                                                                                                                                                                                      pop esi
                                                                                                                                                                                                                                                                                                                                                      pop ebp
                                                                                                                                                                                                                                                                                                                                                      retn 0004h
                                                                                                                                                                                                                                                                                                                                                      and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                                                                                                                                      mov eax, ecx
                                                                                                                                                                                                                                                                                                                                                      and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                                                                                                                                      mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                                                                                                                                                                      mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                                                                                                                                                                      ret
                                                                                                                                                                                                                                                                                                                                                      push ebp
                                                                                                                                                                                                                                                                                                                                                      mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                      push esi
                                                                                                                                                                                                                                                                                                                                                      mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                      lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                                                                                                                      mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                                                                                                                      and dword ptr [eax], 00000000h
                                                                                                                                                                                                                                                                                                                                                      and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                                                                                                                                                                      push eax
                                                                                                                                                                                                                                                                                                                                                      mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                                                                                                                                                      add eax, 04h
                                                                                                                                                                                                                                                                                                                                                      push eax
                                                                                                                                                                                                                                                                                                                                                      call 00007FEAD0AF791Dh
                                                                                                                                                                                                                                                                                                                                                      pop ecx
                                                                                                                                                                                                                                                                                                                                                      pop ecx
                                                                                                                                                                                                                                                                                                                                                      mov eax, esi
                                                                                                                                                                                                                                                                                                                                                      pop esi
                                                                                                                                                                                                                                                                                                                                                      pop ebp
                                                                                                                                                                                                                                                                                                                                                      retn 0004h
                                                                                                                                                                                                                                                                                                                                                      lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                                                                                                                                                                      mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                                                                                                                                                                      push eax
                                                                                                                                                                                                                                                                                                                                                      call 00007FEAD0AF7968h
                                                                                                                                                                                                                                                                                                                                                      pop ecx
                                                                                                                                                                                                                                                                                                                                                      ret
                                                                                                                                                                                                                                                                                                                                                      push ebp
                                                                                                                                                                                                                                                                                                                                                      mov ebp, esp
                                                                                                                                                                                                                                                                                                                                                      push esi
                                                                                                                                                                                                                                                                                                                                                      mov esi, ecx
                                                                                                                                                                                                                                                                                                                                                      lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                                                                                                                                      mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                                                                                                                                      push eax
                                                                                                                                                                                                                                                                                                                                                      call 00007FEAD0AF7951h
                                                                                                                                                                                                                                                                                                                                                      test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                                                                                                                                                                      pop ecx
                                                                                                                                                                                                                                                                                                                                                      Programming Language:
                                                                                                                                                                                                                                                                                                                                                      • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                                                                                                                      • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                                                                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9bc0.rsrc
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                                                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                                                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                                                                                                                                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                                                                                                                                      .rsrc0xd40000x9bc00x9c0024518c5ddaa27e3830b6c29e4cf490edFalse0.31700721153846156data5.331432947920383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                      .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                                                                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                                                                                                                                                                      RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                                                                                                                                                                      RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                                                                                                                                                                      RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                                                                                                                                      RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                                                                                                                                                                      RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                                                                                                                                                                      RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                                                                                                                                                                      RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                                                                                                                                                                      RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                                                                                                                                                                      RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                                                                                                                                                                      RT_RCDATA0xdc7b80xe88data1.0029569892473118
                                                                                                                                                                                                                                                                                                                                                      RT_GROUP_ICON0xdd6400x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                                                                                                                                                                      RT_GROUP_ICON0xdd6b80x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                                                                                                                      RT_GROUP_ICON0xdd6cc0x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                                                                                                                                                                      RT_GROUP_ICON0xdd6e00x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                                                                                                                                      RT_VERSION0xdd6f40xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                                                                                                                                                                      RT_MANIFEST0xdd7d00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                                                                                                                                                                      DLLImport
                                                                                                                                                                                                                                                                                                                                                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                                                                                                                                                                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                                                                                                                                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                                                                                                                                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                                                                                                                                                                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                                                                                                                                                                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                                                                                                                                                                      PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                                                                                                                                                                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                                                                                                                                                                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                                                                                                                                                                      UxTheme.dllIsThemeActive
                                                                                                                                                                                                                                                                                                                                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                                                                                                                                                                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                                                                                                                                                                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                                                                                                                                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                                                                                                                                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                                                                                                                                                                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                                                                                                                                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                                                                                                                                                                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                                                                                                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                                                                                                                                      EnglishGreat Britain
                                                                                                                                                                                                                                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.343544006 CEST49714443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.343580008 CEST4434971435.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.343660116 CEST49714443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.349195957 CEST49714443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.349209070 CEST4434971435.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.349503040 CEST49715443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.349530935 CEST44349715142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.360199928 CEST49715443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.361624002 CEST49715443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.361640930 CEST44349715142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.699873924 CEST49716443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.699903965 CEST44349716142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.703768969 CEST4971780192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.705817938 CEST49716443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.707412004 CEST49716443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.707429886 CEST44349716142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.914194107 CEST804971734.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.914266109 CEST4971780192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.914448977 CEST4971780192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.920011997 CEST4434971435.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.921691895 CEST49714443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.921952009 CEST804971734.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.931132078 CEST49714443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.931144953 CEST4434971435.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.931346893 CEST49714443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.931485891 CEST4434971435.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.931540012 CEST49714443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.931660891 CEST49719443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.931680918 CEST4434971935.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.931781054 CEST49719443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.933505058 CEST49719443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.933522940 CEST4434971935.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.014446020 CEST49720443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.014465094 CEST4434972034.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.015162945 CEST49720443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.016710997 CEST49720443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.016721010 CEST4434972034.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.035298109 CEST49721443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.035316944 CEST4434972134.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.035782099 CEST49721443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.037429094 CEST49721443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.037441969 CEST4434972134.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.049426079 CEST49722443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.049455881 CEST4434972235.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.050057888 CEST49722443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.050282001 CEST49722443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.050296068 CEST4434972235.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.340626955 CEST49723443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.340665102 CEST4434972334.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.340887070 CEST49723443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.341072083 CEST49723443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.341090918 CEST4434972334.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.373485088 CEST804971734.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.373868942 CEST4971780192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.379282951 CEST804971734.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.382025003 CEST4971780192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.387651920 CEST4434971935.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.387891054 CEST49719443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.392442942 CEST49719443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.392450094 CEST4434971935.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.392580032 CEST49719443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.392616987 CEST4434971935.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.392687082 CEST49719443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.486138105 CEST4434972034.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.489331961 CEST49720443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.494201899 CEST49720443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.494209051 CEST4434972034.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.494338989 CEST49720443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.494395971 CEST4434972034.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.494699955 CEST49724443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.494731903 CEST4434972434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.495242119 CEST49724443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.495265961 CEST49720443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.496721029 CEST49724443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.496732950 CEST4434972434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.500267982 CEST4434972235.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.502996922 CEST49722443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.506216049 CEST49722443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.506223917 CEST4434972235.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.506495953 CEST4434972235.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.508208990 CEST4434972134.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.510289907 CEST49721443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.510344028 CEST49722443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.510523081 CEST4434972235.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.510879993 CEST49722443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.511967897 CEST49722443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.514476061 CEST4972580192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.514579058 CEST4972680192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.517257929 CEST49721443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.517257929 CEST49721443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.517270088 CEST4434972134.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.517463923 CEST4434972134.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.519594908 CEST49721443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.523159981 CEST804972534.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.523237944 CEST4972580192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.523332119 CEST804972634.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.523363113 CEST4972580192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.523471117 CEST4972680192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.523552895 CEST4972680192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.530436993 CEST804972534.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.530647039 CEST804972634.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.546854019 CEST44349716142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.547605038 CEST44349716142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.548655033 CEST49716443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.548676014 CEST44349716142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.553714037 CEST49727443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.553738117 CEST4434972734.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.555540085 CEST49716443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.555562973 CEST44349716142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.555624962 CEST49716443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.555749893 CEST44349716142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.556508064 CEST49716443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.557991028 CEST49727443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.557991028 CEST49727443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.558016062 CEST4434972734.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.867268085 CEST4434972334.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.868032932 CEST49723443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.873553991 CEST49723443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.873567104 CEST4434972334.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.873871088 CEST4434972334.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.876218081 CEST49723443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.876341105 CEST49723443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.876374960 CEST4434972334.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.876699924 CEST49728443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.876729012 CEST4434972834.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.877661943 CEST49723443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.877713919 CEST49728443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.877849102 CEST49728443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.877863884 CEST4434972834.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.941224098 CEST4434972434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.941365004 CEST49724443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.947196960 CEST49724443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.947201967 CEST4434972434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.947222948 CEST49724443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.947341919 CEST4434972434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.947767973 CEST49724443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.965022087 CEST804972634.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.965536118 CEST4972680192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.967286110 CEST804972534.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.971446037 CEST804972634.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.979149103 CEST4972680192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.004940987 CEST4434972734.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.005012989 CEST49727443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.025017977 CEST4972580192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.030903101 CEST49727443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.030925035 CEST4434972734.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.031021118 CEST49727443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.031127930 CEST4434972734.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.031186104 CEST49727443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.031584978 CEST49734443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.031627893 CEST4434973434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.031727076 CEST49734443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.033157110 CEST49734443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.033174038 CEST4434973434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.033647060 CEST804972534.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.033857107 CEST4972580192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.314357042 CEST4434972834.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.314431906 CEST49728443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.317841053 CEST49728443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.317863941 CEST4434972834.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.318169117 CEST4434972834.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.320842981 CEST49728443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.320914984 CEST49728443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.321053982 CEST4434972834.160.144.191192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.321172953 CEST49728443192.168.2.1134.160.144.191
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.485546112 CEST4434973434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.495405912 CEST4434973434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.498164892 CEST49734443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.498286963 CEST49734443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.505286932 CEST49734443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.505306959 CEST4434973434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.505387068 CEST49734443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.505605936 CEST4434973434.117.188.166192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.514666080 CEST49734443192.168.2.1134.117.188.166
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.960621119 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.965698004 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.965791941 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.965902090 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.970905066 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.037106037 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.041996956 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.042604923 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.042737961 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.047594070 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.418450117 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.464960098 CEST49745443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.464998960 CEST4434974534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.465734005 CEST49745443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.465747118 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.467736006 CEST49745443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.467756033 CEST4434974534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.498074055 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.546900034 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.616198063 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.623059988 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.714293003 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.759028912 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.920522928 CEST4434974534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.920604944 CEST49745443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.924650908 CEST49745443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.924659014 CEST4434974534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.924734116 CEST49745443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.924825907 CEST4434974534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.927222013 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.928781986 CEST49745443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.933423042 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.024832010 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.027900934 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.034059048 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.067452908 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.125057936 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.128113985 CEST49751443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.128154993 CEST4434975135.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.130412102 CEST49751443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.130412102 CEST49751443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.130445957 CEST4434975135.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.138493061 CEST49752443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.138524055 CEST4434975234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.138816118 CEST49752443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.140396118 CEST49752443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.140418053 CEST4434975234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.183406115 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.267529964 CEST49753443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.267574072 CEST4434975334.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.283082962 CEST49753443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.286914110 CEST49753443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.286926985 CEST4434975334.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.319468021 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.325973034 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.419893980 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.448437929 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.453268051 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.464694023 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.545165062 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.572566032 CEST4434975135.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.574070930 CEST49751443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.592542887 CEST49751443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.592581987 CEST4434975135.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.592849016 CEST4434975135.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.594569921 CEST49751443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.594569921 CEST49751443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.594719887 CEST4434975135.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.595429897 CEST49751443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.595477104 CEST49751443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.597750902 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.607812881 CEST4434975234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.607887030 CEST49752443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.614492893 CEST49752443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.614500999 CEST4434975234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.614518881 CEST49752443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.614736080 CEST4434975234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.614929914 CEST49752443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.620297909 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.625324011 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.635658026 CEST49759443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.635684967 CEST4434975934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.635793924 CEST49759443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.637171984 CEST49759443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.637183905 CEST4434975934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.716607094 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.741533995 CEST4434975334.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.741555929 CEST4434975334.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.741760969 CEST49753443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.767409086 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.805475950 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.807261944 CEST49753443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.807279110 CEST4434975334.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.807344913 CEST49753443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.807634115 CEST4434975334.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.809863091 CEST49753443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.810379982 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.819000006 CEST49760443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.819062948 CEST4434976034.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.820770025 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.822148085 CEST49760443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.823645115 CEST49760443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.823683977 CEST4434976034.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.825007915 CEST49761443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.825046062 CEST4434976134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.825406075 CEST49761443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.825544119 CEST49761443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.825567007 CEST4434976134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.825661898 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.838620901 CEST49762443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.838677883 CEST4434976234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.840466022 CEST49762443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.840639114 CEST49762443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.840656996 CEST4434976234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.901593924 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.917007923 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.952007055 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.970372915 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.997487068 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.002300024 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.093545914 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.098721027 CEST4434975934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.099224091 CEST49759443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.152570009 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.156317949 CEST49759443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.156336069 CEST4434975934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.156423092 CEST49759443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.156639099 CEST4434975934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.158061981 CEST49759443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.158893108 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.163808107 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.235966921 CEST49768443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.236020088 CEST4434976834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.236274004 CEST49768443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.237624884 CEST49768443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.237643003 CEST4434976834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.255100012 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.259598017 CEST4434976134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.267123938 CEST49761443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.267792940 CEST4434976034.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.267885923 CEST49760443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.285881042 CEST4434976234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.285943985 CEST49762443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.308864117 CEST49761443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.308890104 CEST4434976134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.309187889 CEST4434976134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.311506987 CEST49762443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.311520100 CEST4434976234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.312254906 CEST4434976234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.315407038 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.315629959 CEST49761443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.315629959 CEST49761443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.315882921 CEST4434976134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.316102982 CEST49762443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.316191912 CEST49762443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.316498041 CEST4434976234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.317418098 CEST49761443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.317455053 CEST49762443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.318650961 CEST49760443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.318665028 CEST4434976034.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.318727970 CEST49760443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.318911076 CEST4434976034.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.321084976 CEST49760443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.326090097 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.331137896 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.331459045 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.337133884 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355015993 CEST49769443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355057955 CEST4434976934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355165958 CEST49770443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355174065 CEST4434977034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355622053 CEST49769443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355622053 CEST49770443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355737925 CEST49769443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355745077 CEST4434976934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355885983 CEST49770443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.355896950 CEST4434977034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.423644066 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.428888083 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.433064938 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.437858105 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.459512949 CEST44349715142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.459532976 CEST44349715142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.459599018 CEST49715443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.460530996 CEST44349715142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.460669041 CEST49715443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.463774920 CEST49715443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.463784933 CEST44349715142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.464149952 CEST44349715142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.464154005 CEST49715443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.464163065 CEST44349715142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.464771986 CEST49771443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.464803934 CEST44349771142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.467308998 CEST49771443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.468975067 CEST49771443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.468993902 CEST44349771142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.469063997 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.528903008 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.569361925 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.677366972 CEST4434976834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.677786112 CEST49768443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.679441929 CEST44349715142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.679749966 CEST49715443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.681415081 CEST49768443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.681420088 CEST4434976834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.681567907 CEST49768443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.681596041 CEST4434976834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.682626009 CEST49768443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.684278011 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.689105034 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.780605078 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.783715963 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.788621902 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.807167053 CEST4434977034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.807298899 CEST49770443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.809680939 CEST4434976934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.809938908 CEST49770443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.809945107 CEST4434977034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.810220957 CEST49769443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.810347080 CEST4434977034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.812434912 CEST49769443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.812439919 CEST4434976934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.812764883 CEST4434976934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.815299988 CEST49770443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.815408945 CEST49770443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.815589905 CEST4434977034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.815891981 CEST49769443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.815963030 CEST49769443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.816080093 CEST4434976934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.816092014 CEST49770443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.816797018 CEST49769443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.832639933 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.852176905 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.856920958 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.879525900 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.932694912 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.948920012 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.958329916 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.963098049 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.001785040 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.054115057 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.102054119 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.163641930 CEST44349771142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.164679050 CEST49771443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.164683104 CEST44349771142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.164699078 CEST44349771142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.164851904 CEST49771443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.189603090 CEST49771443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.189603090 CEST49771443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.189621925 CEST44349771142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.189855099 CEST44349771142.250.185.206192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.190635920 CEST49771443192.168.2.11142.250.185.206
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.200110912 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.205029011 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.297208071 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.356157064 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.586873055 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.593466997 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.685048103 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.735038042 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.880387068 CEST49817443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.880426884 CEST4434981734.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.883543015 CEST49817443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.885050058 CEST49817443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.885071039 CEST4434981734.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:46.319577932 CEST4434981734.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:46.320564985 CEST49817443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:46.738807917 CEST49817443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:46.738828897 CEST4434981734.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:46.738974094 CEST49817443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:46.739141941 CEST4434981734.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:46.743146896 CEST49817443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.790023088 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.794868946 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.886446953 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.946065903 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.194088936 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.200261116 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.286056042 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.291565895 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.292507887 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.349340916 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.385894060 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.398085117 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.404309988 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.427541971 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.495240927 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.550028086 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.308643103 CEST49905443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.308657885 CEST4434990534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.309009075 CEST49905443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.310489893 CEST49905443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.310504913 CEST4434990534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.824531078 CEST4434990534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.824614048 CEST49905443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.829938889 CEST49905443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.829952955 CEST4434990534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.830025911 CEST49905443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.830104113 CEST4434990534.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.830985069 CEST49905443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.833604097 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.840590954 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.933695078 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.937591076 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.944722891 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.974474907 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:59.035851002 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:59.090384007 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.353434086 CEST49925443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.353467941 CEST4434992535.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.354516983 CEST49925443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.354721069 CEST49925443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.354739904 CEST4434992535.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.359325886 CEST49926443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.359354019 CEST4434992634.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.360150099 CEST49926443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.360150099 CEST49926443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.360183954 CEST4434992634.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.361762047 CEST49927443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.361794949 CEST4434992735.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.364433050 CEST49927443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.370277882 CEST49927443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.370305061 CEST4434992735.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.370724916 CEST49928443192.168.2.1152.222.236.48
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.370742083 CEST4434992852.222.236.48192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.378334999 CEST49928443192.168.2.1152.222.236.48
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.378700972 CEST49928443192.168.2.1152.222.236.48
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.378722906 CEST4434992852.222.236.48192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.379903078 CEST49929443192.168.2.1135.201.103.21
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.379930973 CEST4434992935.201.103.21192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.380474091 CEST49929443192.168.2.1135.201.103.21
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.381982088 CEST49929443192.168.2.1135.201.103.21
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.381998062 CEST4434992935.201.103.21192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.804419041 CEST4434992535.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.804600000 CEST49925443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.808254957 CEST49925443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.808263063 CEST4434992535.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.808507919 CEST4434992535.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.810992956 CEST49925443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.811093092 CEST49925443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.811136961 CEST4434992535.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.811273098 CEST49925443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.814604998 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.821863890 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.821933985 CEST4434992634.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.822046995 CEST49926443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.825676918 CEST49926443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.825685024 CEST4434992634.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.825933933 CEST4434992634.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.828624010 CEST49926443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.828741074 CEST49926443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.828795910 CEST4434992634.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.829099894 CEST49926443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.836551905 CEST4434992935.201.103.21192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.836633921 CEST49929443192.168.2.1135.201.103.21
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.839844942 CEST4434992735.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.840049028 CEST49927443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.843199968 CEST49929443192.168.2.1135.201.103.21
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.843209028 CEST4434992935.201.103.21192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.843292952 CEST49929443192.168.2.1135.201.103.21
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.843470097 CEST4434992935.201.103.21192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.844095945 CEST49929443192.168.2.1135.201.103.21
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.845088005 CEST49927443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.845088959 CEST49927443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.845102072 CEST4434992735.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.845271111 CEST4434992735.190.72.216192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.845520973 CEST49927443192.168.2.1135.190.72.216
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.855680943 CEST49935443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.855729103 CEST4434993534.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.855802059 CEST49935443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.855931044 CEST49935443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.855938911 CEST4434993534.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.915437937 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.918277979 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.924828053 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.957439899 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.016205072 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.060267925 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.080045938 CEST4434992852.222.236.48192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.080060959 CEST4434992852.222.236.48192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.080262899 CEST49928443192.168.2.1152.222.236.48
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.083750963 CEST49928443192.168.2.1152.222.236.48
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.083765984 CEST4434992852.222.236.48192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.083990097 CEST4434992852.222.236.48192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.086639881 CEST49928443192.168.2.1152.222.236.48
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.086735964 CEST49928443192.168.2.1152.222.236.48
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.086796999 CEST4434992852.222.236.48192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.086951017 CEST49928443192.168.2.1152.222.236.48
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.095824957 CEST49936443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.095849037 CEST4434993635.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.097702980 CEST49937443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.097747087 CEST4434993735.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.098167896 CEST49937443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.098213911 CEST49936443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.098304987 CEST49936443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.098310947 CEST4434993635.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.098431110 CEST49937443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.098448038 CEST4434993735.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.100034952 CEST49938443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.100044966 CEST4434993835.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.100387096 CEST49938443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.100521088 CEST49938443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.100537062 CEST4434993835.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.102022886 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.108325005 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.199771881 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.203135014 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.210253000 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.240318060 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.296386957 CEST4434993534.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.302330971 CEST49935443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.306288004 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.309917927 CEST49935443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.309937954 CEST4434993534.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.310208082 CEST4434993534.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.312469006 CEST49935443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.312576056 CEST49935443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.312649012 CEST4434993534.149.100.209192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.313432932 CEST49935443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.313432932 CEST49935443192.168.2.1134.149.100.209
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.317017078 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.324193001 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.356193066 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.417184114 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.420416117 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.426593065 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.471985102 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.517770052 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.556293011 CEST4434993635.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.556380987 CEST49936443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.559406042 CEST49936443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.559412003 CEST4434993635.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.559650898 CEST4434993635.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.561939001 CEST4434993735.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.562032938 CEST49937443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.564412117 CEST49937443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.564421892 CEST4434993735.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.564663887 CEST4434993735.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.564690113 CEST49936443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.564692020 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.564779997 CEST49936443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.564816952 CEST4434993835.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.564874887 CEST4434993635.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.567643881 CEST49937443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.567722082 CEST49937443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.567759991 CEST4434993735.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.570358038 CEST49937443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.570395947 CEST49937443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.570415974 CEST49936443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.570573092 CEST49938443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.574677944 CEST49938443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.574692011 CEST4434993835.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.574907064 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.575056076 CEST4434993835.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.578051090 CEST49938443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.578113079 CEST49938443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.578294992 CEST4434993835.244.181.201192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.578896999 CEST49938443192.168.2.1135.244.181.201
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.581304073 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.673223019 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.682171106 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.689316034 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.726036072 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.780761957 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.826409101 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:12.686945915 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:12.695173025 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:12.787256002 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:12.793811083 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.863322020 CEST62876443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.863382101 CEST4436287634.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.863934040 CEST62876443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.865300894 CEST62876443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.865318060 CEST4436287634.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.301017046 CEST4436287634.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.303421021 CEST62876443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.307419062 CEST62876443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.307419062 CEST62876443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.307441950 CEST4436287634.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.307588100 CEST4436287634.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.308135986 CEST62876443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.308689117 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.313513994 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.407133102 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.410742998 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.415680885 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.456859112 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.506584883 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.557233095 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:30.421888113 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:30.428136110 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:30.522300959 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:30.529534101 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.395757914 CEST62877443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.395806074 CEST4436287734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396049023 CEST62878443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396068096 CEST4436287834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396306038 CEST62877443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396579981 CEST62878443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396586895 CEST62879443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396635056 CEST4436287934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396785975 CEST62877443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396799088 CEST4436287734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396898031 CEST62878443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.396908045 CEST4436287834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.397161007 CEST62880443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.397170067 CEST4436288034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.397294998 CEST62881443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.397313118 CEST4436288134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.407749891 CEST62879443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.407767057 CEST62881443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.407785892 CEST62880443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.408076048 CEST62879443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.408088923 CEST4436287934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.408308029 CEST62881443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.408329010 CEST4436288134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.408411026 CEST62880443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.408420086 CEST4436288034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.410274029 CEST62882443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.410303116 CEST4436288234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.410355091 CEST62882443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.410527945 CEST62882443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.410540104 CEST4436288234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.961935043 CEST4436287734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.962265968 CEST62877443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.963586092 CEST4436287834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.965039015 CEST4436287934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.965058088 CEST4436287934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.965487957 CEST62878443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.965497971 CEST62879443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.965924978 CEST62877443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.965936899 CEST4436287734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.966212988 CEST4436287734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.966641903 CEST4436288134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.966656923 CEST4436288134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.966701984 CEST4436288234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.966731071 CEST62881443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.966806889 CEST62882443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.967550039 CEST4436288034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.967559099 CEST4436288034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.969073057 CEST62878443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.969080925 CEST4436287834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.969400883 CEST4436287834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.972134113 CEST62879443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.972165108 CEST4436287934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.972392082 CEST62880443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.972632885 CEST4436287934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.975424051 CEST62881443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.975433111 CEST4436288134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.975783110 CEST4436288134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.977957964 CEST62880443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.978012085 CEST4436288034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.978380919 CEST4436288034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.980391026 CEST62882443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.980410099 CEST4436288234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.980748892 CEST4436288234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.988840103 CEST62877443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.989170074 CEST4436287734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.989480019 CEST62877443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.989492893 CEST4436287734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.991225004 CEST62878443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.991400003 CEST62879443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.991535902 CEST62879443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.991540909 CEST4436287834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.991626024 CEST62878443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.991631985 CEST4436287834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.991735935 CEST4436287934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.992710114 CEST62881443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.992737055 CEST62880443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.992872953 CEST62880443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.992955923 CEST62881443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.992994070 CEST4436288034.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.993271112 CEST4436288134.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.995199919 CEST62882443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.995304108 CEST62882443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.995553970 CEST62879443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.995578051 CEST62881443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.995579004 CEST4436288234.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.995584011 CEST62880443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.995598078 CEST62877443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.995621920 CEST62878443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.995695114 CEST62882443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.120564938 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.127562046 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.154337883 CEST62883443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.154441118 CEST4436288334.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.162921906 CEST62884443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.162981987 CEST4436288434.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163069010 CEST62885443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163116932 CEST4436288534.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163367987 CEST62886443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163376093 CEST4436288634.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163486958 CEST62887443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163501978 CEST4436288734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163635969 CEST62888443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163681030 CEST4436288834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163800955 CEST62883443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163809061 CEST62884443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163815022 CEST62885443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163815022 CEST62886443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.163995981 CEST62887443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164006948 CEST62883443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164026022 CEST4436288334.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164113045 CEST62885443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164119959 CEST4436288534.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164176941 CEST62884443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164190054 CEST4436288434.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164247036 CEST62887443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164254904 CEST4436288734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164308071 CEST62886443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164320946 CEST4436288634.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164562941 CEST62888443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164724112 CEST62888443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.164733887 CEST4436288834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.219002962 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.259658098 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.266751051 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.267893076 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.358043909 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.399524927 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.713490009 CEST4436288334.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.713505030 CEST4436288334.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.713861942 CEST4436288534.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.714139938 CEST4436288834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.714636087 CEST4436288634.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.714919090 CEST4436288434.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.716264963 CEST4436288734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.719402075 CEST4436288534.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.719403028 CEST4436288434.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.719403982 CEST4436288634.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.722510099 CEST62883443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.722515106 CEST62885443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.722515106 CEST62888443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.722987890 CEST62886443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.723006010 CEST62884443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.723057032 CEST62887443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.723057032 CEST62884443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.723094940 CEST62885443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.726322889 CEST62883443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.726336002 CEST4436288334.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.726691961 CEST4436288334.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.728569031 CEST62885443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.728580952 CEST4436288534.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.728874922 CEST4436288534.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.730747938 CEST62884443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.730765104 CEST4436288434.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.731054068 CEST4436288434.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.732877016 CEST62888443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.732894897 CEST4436288834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.733185053 CEST4436288834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.735110998 CEST62887443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.735131025 CEST4436288734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.735363960 CEST4436288734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.737245083 CEST62886443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.737252951 CEST4436288634.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.737634897 CEST4436288634.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.744647980 CEST62883443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.744896889 CEST62888443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.744982004 CEST4436288334.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745098114 CEST62888443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745112896 CEST4436288834.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745186090 CEST62883443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745197058 CEST4436288334.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745264053 CEST62885443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745510101 CEST4436288534.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745740891 CEST62885443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745748997 CEST4436288534.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745851994 CEST62884443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.745965004 CEST62884443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.746052980 CEST4436288434.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.746747971 CEST62889443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.746779919 CEST4436288934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.748936892 CEST62887443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.749025106 CEST62887443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.749106884 CEST4436288734.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.751415968 CEST62886443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.751487017 CEST62886443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.751648903 CEST4436288634.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.752944946 CEST62888443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.752958059 CEST62884443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.753007889 CEST62885443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.753026009 CEST62887443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.753066063 CEST62889443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.753196955 CEST62889443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.753205061 CEST4436288934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.753225088 CEST62886443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.755342960 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.761481047 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.853126049 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.859553099 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.866230965 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.894637108 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.957513094 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.963411093 CEST4436288334.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.963471889 CEST62883443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.010557890 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.199363947 CEST4436288934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.199436903 CEST62889443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.202712059 CEST62889443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.202722073 CEST4436288934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.202963114 CEST4436288934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.205092907 CEST62889443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.205235958 CEST62889443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.205282927 CEST4436288934.120.208.123192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.205456018 CEST62889443192.168.2.1134.120.208.123
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.209414005 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.216108084 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.318001986 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.321922064 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.328891993 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.358398914 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.419971943 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.474353075 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:43.326297998 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:43.331360102 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:43.426584005 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:43.431583881 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:53.353122950 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:53.359610081 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:53.453504086 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:53.458390951 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.382782936 CEST62890443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.382844925 CEST4436289034.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.383316040 CEST62890443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.385548115 CEST62890443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.385576010 CEST4436289034.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.845289946 CEST4436289034.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.845402956 CEST62890443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.851557970 CEST62890443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.851593018 CEST4436289034.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.851727962 CEST62890443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.851828098 CEST4436289034.107.243.93192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.852235079 CEST62890443192.168.2.1134.107.243.93
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.855865955 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.863502979 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.955041885 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.960212946 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.967686892 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:01.006611109 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:01.058573961 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:01.106806993 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:10.965780020 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:10.972526073 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:11.066140890 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:11.073313951 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:20.978110075 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:20.984872103 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:21.078372955 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:21.085299015 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:31.002825975 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:31.009049892 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:31.103187084 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:31.109308004 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:41.015824080 CEST4974280192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:41.020946026 CEST804974234.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:41.116039038 CEST4974180192.168.2.1134.107.221.82
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:41.120945930 CEST804974134.107.221.82192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.333551884 CEST6148753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.333729982 CEST6172553192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.340742111 CEST53617251.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.346209049 CEST6053753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.346209049 CEST5814153192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.347547054 CEST5910453192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.353605986 CEST53581411.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.354120016 CEST53605371.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.355160952 CEST53591041.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.360783100 CEST5770753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.361393929 CEST5632653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.362175941 CEST5080753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.368017912 CEST53577071.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.368520975 CEST53563261.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.369241953 CEST53508071.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.003839970 CEST5839653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.010656118 CEST53583961.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.014933109 CEST5908753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.017330885 CEST6319853192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.023529053 CEST53590871.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.024080992 CEST5789353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.026057959 CEST53631981.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.030736923 CEST53578931.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.035726070 CEST6499653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.043612957 CEST53649961.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.048836946 CEST5048453192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.050179005 CEST5617753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.056042910 CEST53504841.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.057755947 CEST53561771.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.078114033 CEST6230653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.086643934 CEST53623061.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.332025051 CEST6017253192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.339682102 CEST53601721.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.340830088 CEST5268853192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.348381996 CEST53526881.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.350913048 CEST6451353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.358001947 CEST53645131.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.486912966 CEST5851353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.487539053 CEST5403653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.497282982 CEST53585131.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.497844934 CEST53540361.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.499336958 CEST6316853192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.442195892 CEST6320753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.451747894 CEST5321853192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.460354090 CEST53532181.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.465249062 CEST5840653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.474437952 CEST53584061.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.475028992 CEST4953653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.484204054 CEST53495361.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.532401085 CEST53496851.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.138700962 CEST5806353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.147577047 CEST53580631.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.150940895 CEST5326953192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.159684896 CEST53532691.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.239798069 CEST6490053192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.247999907 CEST53649001.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.270740032 CEST5614553192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.278990030 CEST53561451.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.286672115 CEST5112453192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.295492887 CEST53511241.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.743572950 CEST6460353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.743855953 CEST6250953192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.744098902 CEST6274653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST53646031.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.752432108 CEST53625091.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.752468109 CEST53627461.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.380012989 CEST5869153192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.382122993 CEST5939353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.384233952 CEST5939853192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST53586911.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.387461901 CEST4947453192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.389394045 CEST53593931.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.389832020 CEST5206353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.390714884 CEST53593981.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.391921997 CEST5278853192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.394088984 CEST53494741.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.394721985 CEST5526753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.396847010 CEST53520631.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.397553921 CEST6520353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.398961067 CEST53527881.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.402108908 CEST53552671.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.402801991 CEST6409653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.404366016 CEST53652031.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.405131102 CEST6165353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.409615993 CEST53640961.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.410132885 CEST6550153192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.411633015 CEST53616531.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.412898064 CEST5894153192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.417336941 CEST53655011.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.419667006 CEST53589411.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.636251926 CEST5487953192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.642976999 CEST53548791.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.650918007 CEST6302953192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.657418966 CEST53630291.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.670969963 CEST5561653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.678358078 CEST53556161.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.881014109 CEST6083153192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.888045073 CEST53608311.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.789064884 CEST5073553192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.308938026 CEST5940753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.317620039 CEST53594071.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.331275940 CEST5203753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.343518972 CEST53520371.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.351066113 CEST5779153192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.363708019 CEST53577911.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.364144087 CEST5854653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.365385056 CEST5572453192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.375096083 CEST53557241.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.376925945 CEST53585461.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.379185915 CEST5168753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.380415916 CEST5106853192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.388711929 CEST53516871.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.391046047 CEST53510681.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.400734901 CEST6520653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.410499096 CEST53652061.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.815135956 CEST5173753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:03.299685955 CEST5359151162.159.36.2192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:03.768955946 CEST5734453192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:03.778477907 CEST53573441.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.645415068 CEST6528753192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.855925083 CEST53652871.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.863688946 CEST6087353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.871052027 CEST53608731.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.308926105 CEST5232953192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.316643953 CEST5644653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.323796988 CEST53564461.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.324306965 CEST4962653192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.331283092 CEST53496261.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.408277988 CEST5108353192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.408477068 CEST6201453192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.415486097 CEST53510831.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.415620089 CEST53620141.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.398343086 CEST5107553192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.409300089 CEST53510751.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.410187960 CEST5338853192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.419858932 CEST53533881.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.383203983 CEST5620453192.168.2.111.1.1.1
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.392870903 CEST53562041.1.1.1192.168.2.11
                                                                                                                                                                                                                                                                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.333551884 CEST192.168.2.111.1.1.10xdc06Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.333729982 CEST192.168.2.111.1.1.10xe9a4Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.346209049 CEST192.168.2.111.1.1.10x6568Standard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.346209049 CEST192.168.2.111.1.1.10x9ac5Standard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.347547054 CEST192.168.2.111.1.1.10xf44eStandard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.360783100 CEST192.168.2.111.1.1.10x643Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.361393929 CEST192.168.2.111.1.1.10x75a4Standard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.362175941 CEST192.168.2.111.1.1.10x94cdStandard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.003839970 CEST192.168.2.111.1.1.10x6a79Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.014933109 CEST192.168.2.111.1.1.10x41f2Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.017330885 CEST192.168.2.111.1.1.10x979fStandard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.024080992 CEST192.168.2.111.1.1.10xd6e1Standard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.035726070 CEST192.168.2.111.1.1.10x6b54Standard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.048836946 CEST192.168.2.111.1.1.10x9b25Standard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.050179005 CEST192.168.2.111.1.1.10x7de9Standard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.078114033 CEST192.168.2.111.1.1.10xed47Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.332025051 CEST192.168.2.111.1.1.10xda5aStandard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.340830088 CEST192.168.2.111.1.1.10x1432Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.350913048 CEST192.168.2.111.1.1.10x5ee8Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.486912966 CEST192.168.2.111.1.1.10x2cceStandard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.487539053 CEST192.168.2.111.1.1.10x3b28Standard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.499336958 CEST192.168.2.111.1.1.10x3abbStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.442195892 CEST192.168.2.111.1.1.10x6a8cStandard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.451747894 CEST192.168.2.111.1.1.10xcc6cStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.465249062 CEST192.168.2.111.1.1.10xc161Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.475028992 CEST192.168.2.111.1.1.10x9359Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.138700962 CEST192.168.2.111.1.1.10xe14aStandard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.150940895 CEST192.168.2.111.1.1.10x775cStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.239798069 CEST192.168.2.111.1.1.10xbae1Standard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.270740032 CEST192.168.2.111.1.1.10x67a0Standard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.286672115 CEST192.168.2.111.1.1.10x2351Standard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.743572950 CEST192.168.2.111.1.1.10xecf6Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.743855953 CEST192.168.2.111.1.1.10xdcd0Standard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.744098902 CEST192.168.2.111.1.1.10xfdabStandard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.380012989 CEST192.168.2.111.1.1.10x759cStandard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.382122993 CEST192.168.2.111.1.1.10x28c0Standard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.384233952 CEST192.168.2.111.1.1.10x20b3Standard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.387461901 CEST192.168.2.111.1.1.10x9f0dStandard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.389832020 CEST192.168.2.111.1.1.10x55f0Standard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.391921997 CEST192.168.2.111.1.1.10x7dddStandard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.394721985 CEST192.168.2.111.1.1.10xd4bfStandard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.397553921 CEST192.168.2.111.1.1.10xc599Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.402801991 CEST192.168.2.111.1.1.10x90d1Standard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.405131102 CEST192.168.2.111.1.1.10x819eStandard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.410132885 CEST192.168.2.111.1.1.10x2252Standard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.412898064 CEST192.168.2.111.1.1.10x5679Standard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.636251926 CEST192.168.2.111.1.1.10x714fStandard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.650918007 CEST192.168.2.111.1.1.10x2e11Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.670969963 CEST192.168.2.111.1.1.10x1d29Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.881014109 CEST192.168.2.111.1.1.10xcdcStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.789064884 CEST192.168.2.111.1.1.10x9535Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.308938026 CEST192.168.2.111.1.1.10x1ddfStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.331275940 CEST192.168.2.111.1.1.10xe374Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.351066113 CEST192.168.2.111.1.1.10x194cStandard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.364144087 CEST192.168.2.111.1.1.10x71edStandard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.365385056 CEST192.168.2.111.1.1.10xaabStandard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.379185915 CEST192.168.2.111.1.1.10x26bfStandard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.380415916 CEST192.168.2.111.1.1.10xbc3eStandard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.400734901 CEST192.168.2.111.1.1.10x8198Standard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.815135956 CEST192.168.2.111.1.1.10xf16aStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:03.768955946 CEST192.168.2.111.1.1.10xe5c0Standard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.645415068 CEST192.168.2.111.1.1.10xcaa0Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.863688946 CEST192.168.2.111.1.1.10x85d3Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.308926105 CEST192.168.2.111.1.1.10xe23fStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.316643953 CEST192.168.2.111.1.1.10xf35fStandard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.324306965 CEST192.168.2.111.1.1.10x6702Standard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.408277988 CEST192.168.2.111.1.1.10x7c51Standard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.408477068 CEST192.168.2.111.1.1.10x4d96Standard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.398343086 CEST192.168.2.111.1.1.10xb9c7Standard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.410187960 CEST192.168.2.111.1.1.10xb170Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.383203983 CEST192.168.2.111.1.1.10x922fStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.340655088 CEST1.1.1.1192.168.2.110xdc06No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.340655088 CEST1.1.1.1192.168.2.110xdc06No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.340717077 CEST1.1.1.1192.168.2.110x877No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.340742111 CEST1.1.1.1192.168.2.110xe9a4No error (0)youtube.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.353605986 CEST1.1.1.1192.168.2.110x9ac5No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.354120016 CEST1.1.1.1192.168.2.110x6568No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.355160952 CEST1.1.1.1192.168.2.110xf44eNo error (0)youtube.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.368520975 CEST1.1.1.1192.168.2.110x75a4No error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.369241953 CEST1.1.1.1192.168.2.110x94cdNo error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.010656118 CEST1.1.1.1192.168.2.110x6a79No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.023529053 CEST1.1.1.1192.168.2.110x41f2No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.026057959 CEST1.1.1.1192.168.2.110x979fNo error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.026057959 CEST1.1.1.1192.168.2.110x979fNo error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.043612957 CEST1.1.1.1192.168.2.110x6b54No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.046091080 CEST1.1.1.1192.168.2.110x578bNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.046091080 CEST1.1.1.1192.168.2.110x578bNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.057755947 CEST1.1.1.1192.168.2.110x7de9No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.339682102 CEST1.1.1.1192.168.2.110xda5aNo error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.339682102 CEST1.1.1.1192.168.2.110xda5aNo error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.339682102 CEST1.1.1.1192.168.2.110xda5aNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.348381996 CEST1.1.1.1192.168.2.110x1432No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.358001947 CEST1.1.1.1192.168.2.110x5ee8No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.497282982 CEST1.1.1.1192.168.2.110x2cceNo error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.497844934 CEST1.1.1.1192.168.2.110x3b28No error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.497844934 CEST1.1.1.1192.168.2.110x3b28No error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.507095098 CEST1.1.1.1192.168.2.110x3abbNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.507095098 CEST1.1.1.1192.168.2.110x3abbNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.451359034 CEST1.1.1.1192.168.2.110x6a8cNo error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.460354090 CEST1.1.1.1192.168.2.110xcc6cNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.474437952 CEST1.1.1.1192.168.2.110xc161No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.101078987 CEST1.1.1.1192.168.2.110xcaccNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.101078987 CEST1.1.1.1192.168.2.110xcaccNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.136462927 CEST1.1.1.1192.168.2.110x5b2dNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.147577047 CEST1.1.1.1192.168.2.110xe14aNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.247999907 CEST1.1.1.1192.168.2.110xbae1No error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.247999907 CEST1.1.1.1192.168.2.110xbae1No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.278990030 CEST1.1.1.1192.168.2.110x67a0No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.634825945 CEST1.1.1.1192.168.2.110xe472No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.751882076 CEST1.1.1.1192.168.2.110xecf6No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.752432108 CEST1.1.1.1192.168.2.110xdcd0No error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.752432108 CEST1.1.1.1192.168.2.110xdcd0No error (0)star-mini.c10r.facebook.com157.240.0.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.752468109 CEST1.1.1.1192.168.2.110xfdabNo error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.752468109 CEST1.1.1.1192.168.2.110xfdabNo error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.386924028 CEST1.1.1.1192.168.2.110x759cNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.389394045 CEST1.1.1.1192.168.2.110x28c0No error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.390714884 CEST1.1.1.1192.168.2.110x20b3No error (0)star-mini.c10r.facebook.com157.240.253.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.394088984 CEST1.1.1.1192.168.2.110x9f0dNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.394088984 CEST1.1.1.1192.168.2.110x9f0dNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.394088984 CEST1.1.1.1192.168.2.110x9f0dNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.394088984 CEST1.1.1.1192.168.2.110x9f0dNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.396847010 CEST1.1.1.1192.168.2.110x55f0No error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.398961067 CEST1.1.1.1192.168.2.110x7dddNo error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.402108908 CEST1.1.1.1192.168.2.110xd4bfNo error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.402108908 CEST1.1.1.1192.168.2.110xd4bfNo error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.402108908 CEST1.1.1.1192.168.2.110xd4bfNo error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.402108908 CEST1.1.1.1192.168.2.110xd4bfNo error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.402108908 CEST1.1.1.1192.168.2.110xd4bfNo error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.404366016 CEST1.1.1.1192.168.2.110xc599No error (0)twitter.com104.244.42.65A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.409615993 CEST1.1.1.1192.168.2.110x90d1No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.409615993 CEST1.1.1.1192.168.2.110x90d1No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.409615993 CEST1.1.1.1192.168.2.110x90d1No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.409615993 CEST1.1.1.1192.168.2.110x90d1No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:41.411633015 CEST1.1.1.1192.168.2.110x819eNo error (0)twitter.com104.244.42.193A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.642976999 CEST1.1.1.1192.168.2.110x714fNo error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.642976999 CEST1.1.1.1192.168.2.110x714fNo error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.642976999 CEST1.1.1.1192.168.2.110x714fNo error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:45.657418966 CEST1.1.1.1192.168.2.110x2e11No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.795840025 CEST1.1.1.1192.168.2.110x9535No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.795840025 CEST1.1.1.1192.168.2.110x9535No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.344444036 CEST1.1.1.1192.168.2.110xb505No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.344444036 CEST1.1.1.1192.168.2.110xb505No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.363708019 CEST1.1.1.1192.168.2.110x194cNo error (0)services.addons.mozilla.org52.222.236.48A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.363708019 CEST1.1.1.1192.168.2.110x194cNo error (0)services.addons.mozilla.org52.222.236.120A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.363708019 CEST1.1.1.1192.168.2.110x194cNo error (0)services.addons.mozilla.org52.222.236.80A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.363708019 CEST1.1.1.1192.168.2.110x194cNo error (0)services.addons.mozilla.org52.222.236.23A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.375096083 CEST1.1.1.1192.168.2.110xaabNo error (0)services.addons.mozilla.org18.245.162.100A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.375096083 CEST1.1.1.1192.168.2.110xaabNo error (0)services.addons.mozilla.org18.245.162.3A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.375096083 CEST1.1.1.1192.168.2.110xaabNo error (0)services.addons.mozilla.org18.245.162.105A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.375096083 CEST1.1.1.1192.168.2.110xaabNo error (0)services.addons.mozilla.org18.245.162.43A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.376925945 CEST1.1.1.1192.168.2.110x71edNo error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.376925945 CEST1.1.1.1192.168.2.110x71edNo error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.391046047 CEST1.1.1.1192.168.2.110xbc3eNo error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.824258089 CEST1.1.1.1192.168.2.110xf16aNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.824258089 CEST1.1.1.1192.168.2.110xf16aNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.584176064 CEST1.1.1.1192.168.2.110x154No error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.584176064 CEST1.1.1.1192.168.2.110x154No error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:03.778477907 CEST1.1.1.1192.168.2.110xe5c0Name error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:19.855925083 CEST1.1.1.1192.168.2.110xcaa0No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.315567017 CEST1.1.1.1192.168.2.110xe23fNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.315567017 CEST1.1.1.1192.168.2.110xe23fNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.323796988 CEST1.1.1.1192.168.2.110xf35fNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.331283092 CEST1.1.1.1192.168.2.110x6702No error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.415486097 CEST1.1.1.1192.168.2.110x7c51No error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.415620089 CEST1.1.1.1192.168.2.110x4d96No error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.415620089 CEST1.1.1.1192.168.2.110x4d96No error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.386642933 CEST1.1.1.1192.168.2.110x4940No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:31.409300089 CEST1.1.1.1192.168.2.110xb9c7No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                                                                                                                                      • detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                      0192.168.2.114971734.107.221.82806016C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:34.914448977 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.373485088 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 05:25:33 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 62702
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                      1192.168.2.114972534.107.221.82806016C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.523363113 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.967286110 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:24:18 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44777
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success


                                                                                                                                                                                                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                      2192.168.2.114972634.107.221.82806016C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.523552895 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:35.965022087 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44803
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                      3192.168.2.114974134.107.221.82806016C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:36.965902090 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.418450117 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52031
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.616198063 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.714293003 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52031
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.027900934 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.125057936 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52032
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.448437929 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.545165062 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52032
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.805475950 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.901593924 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52032
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.997487068 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.093545914 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52033
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.326090097 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.423644066 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52033
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.433064938 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.528903008 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52033
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.783715963 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.879525900 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52033
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.958329916 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.054115057 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52034
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.586873055 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.685048103 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52034
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.194088936 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.291565895 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52044
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.398085117 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.495240927 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52044
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.937591076 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:59.035851002 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52052
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.918277979 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.016205072 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52055
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.203135014 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.306288004 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52056
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.420416117 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.517770052 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52056
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.682171106 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.780761957 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52056
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:12.787256002 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.410742998 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.506584883 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52074
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:30.522300959 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.259658098 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.358043909 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52086
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.859553099 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.957513094 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52086
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.321922064 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.419971943 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52087
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:43.426584005 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:53.453504086 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.960212946 CEST305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:01.058573961 CEST216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 8
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 08:23:26 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 52115
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/plain
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: success
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:11.066140890 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:21.078372955 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:31.103187084 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:41.116039038 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:


                                                                                                                                                                                                                                                                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                                                                                                                                      4192.168.2.114974234.107.221.82806016C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.042737961 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.498074055 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44805
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:37.927222013 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.024832010 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44805
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.319468021 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.419893980 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44806
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.620297909 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.716607094 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44806
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.820770025 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:38.917007923 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44806
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.158893108 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.255100012 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44807
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.331459045 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.428888083 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44807
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.684278011 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.780605078 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44807
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.852176905 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:39.948920012 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44807
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.200110912 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:40.297208071 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44808
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.790023088 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:48.886446953 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44816
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.286056042 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:50.385894060 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44818
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.833604097 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:50:58.933695078 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44826
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.814604998 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:01.915437937 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44829
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.102022886 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.199771881 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44830
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.317017078 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.417184114 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44830
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.574907064 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:02.673223019 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44830
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:12.686945915 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.308689117 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:20.407133102 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44848
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:30.421888113 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.120564938 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.219002962 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44860
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.755342960 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:32.853126049 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44860
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.209414005 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:33.318001986 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44861
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:43.326297998 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:51:53.353122950 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.855865955 CEST303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                                                                                                                                      Host: detectportal.firefox.com
                                                                                                                                                                                                                                                                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                                                                                                                                      Accept: */*
                                                                                                                                                                                                                                                                                                                                                      Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                                                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: no-cache
                                                                                                                                                                                                                                                                                                                                                      Pragma: no-cache
                                                                                                                                                                                                                                                                                                                                                      Connection: keep-alive
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:00.955041885 CEST298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                                                                                                                                      Server: nginx
                                                                                                                                                                                                                                                                                                                                                      Content-Length: 90
                                                                                                                                                                                                                                                                                                                                                      Via: 1.1 google
                                                                                                                                                                                                                                                                                                                                                      Date: Mon, 07 Oct 2024 10:23:52 GMT
                                                                                                                                                                                                                                                                                                                                                      Age: 44888
                                                                                                                                                                                                                                                                                                                                                      Content-Type: text/html
                                                                                                                                                                                                                                                                                                                                                      Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                                                                                                                                      Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                                                                                                                                      Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:10.965780020 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:20.978110075 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:31.002825975 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:
                                                                                                                                                                                                                                                                                                                                                      Oct 8, 2024 00:52:41.015824080 CEST6OUTData Raw: 00
                                                                                                                                                                                                                                                                                                                                                      Data Ascii:


                                                                                                                                                                                                                                                                                                                                                      Click to jump to process

                                                                                                                                                                                                                                                                                                                                                      Click to jump to process

                                                                                                                                                                                                                                                                                                                                                      Click to dive into process behavior distribution

                                                                                                                                                                                                                                                                                                                                                      Click to jump to process

                                                                                                                                                                                                                                                                                                                                                      Target ID:1
                                                                                                                                                                                                                                                                                                                                                      Start time:18:50:28
                                                                                                                                                                                                                                                                                                                                                      Start date:07/10/2024
                                                                                                                                                                                                                                                                                                                                                      Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                                                                                                                                                                                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                                                                                                                                                                      Imagebase:0x7b0000
                                                                                                                                                                                                                                                                                                                                                      File size:919'040 bytes
                                                                                                                                                                                                                                                                                                                                                      MD5 hash:9D7EA17AA6D8EC2653FBD07092D2A3D8
                                                                                                                                                                                                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                      Reputation:low
                                                                                                                                                                                                                                                                                                                                                      Has exited:true

                                                                                                                                                                                                                                                                                                                                                      Target ID:3
                                                                                                                                                                                                                                                                                                                                                      Start time:18:50:28
                                                                                                                                                                                                                                                                                                                                                      Start date:07/10/2024
                                                                                                                                                                                                                                                                                                                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                      Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                                                                                                      Imagebase:0x7ff6de060000
                                                                                                                                                                                                                                                                                                                                                      File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                                                                                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                                                                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                      Reputation:high
                                                                                                                                                                                                                                                                                                                                                      Has exited:true

                                                                                                                                                                                                                                                                                                                                                      Target ID:6
                                                                                                                                                                                                                                                                                                                                                      Start time:18:50:29
                                                                                                                                                                                                                                                                                                                                                      Start date:07/10/2024
                                                                                                                                                                                                                                                                                                                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                      Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                                                                                                                                                                      Imagebase:0x7ff6de060000
                                                                                                                                                                                                                                                                                                                                                      File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                      Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                      Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                      Reputation:high
                                                                                                                                                                                                                                                                                                                                                      Has exited:true

                                                                                                                                                                                                                                                                                                                                                      Target ID:7
                                                                                                                                                                                                                                                                                                                                                      Start time:18:50:29
                                                                                                                                                                                                                                                                                                                                                      Start date:07/10/2024
                                                                                                                                                                                                                                                                                                                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                      Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                                                                                                                                      Imagebase:0x7ff6de060000
                                                                                                                                                                                                                                                                                                                                                      File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                      Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                      Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                      Reputation:high
                                                                                                                                                                                                                                                                                                                                                      Has exited:false

                                                                                                                                                                                                                                                                                                                                                      Target ID:11
                                                                                                                                                                                                                                                                                                                                                      Start time:18:50:30
                                                                                                                                                                                                                                                                                                                                                      Start date:07/10/2024
                                                                                                                                                                                                                                                                                                                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                      Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2296 -parentBuildID 20230927232528 -prefsHandle 2208 -prefMapHandle 2200 -prefsLen 25393 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf2d1419-78d8-4674-a0a7-5faab0442aeb} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a70710 socket
                                                                                                                                                                                                                                                                                                                                                      Imagebase:0x7ff6de060000
                                                                                                                                                                                                                                                                                                                                                      File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                      Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                      Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                      Reputation:high
                                                                                                                                                                                                                                                                                                                                                      Has exited:false

                                                                                                                                                                                                                                                                                                                                                      Target ID:15
                                                                                                                                                                                                                                                                                                                                                      Start time:18:50:32
                                                                                                                                                                                                                                                                                                                                                      Start date:07/10/2024
                                                                                                                                                                                                                                                                                                                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                      Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3548 -parentBuildID 20230927232528 -prefsHandle 1388 -prefMapHandle 1256 -prefsLen 26242 -prefMapSize 238472 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e3e6854-25f5-48be-aca9-16793ff11bca} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c02a42910 rdd
                                                                                                                                                                                                                                                                                                                                                      Imagebase:0x7ff6de060000
                                                                                                                                                                                                                                                                                                                                                      File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                      Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                      Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                      Reputation:high
                                                                                                                                                                                                                                                                                                                                                      Has exited:false

                                                                                                                                                                                                                                                                                                                                                      Target ID:16
                                                                                                                                                                                                                                                                                                                                                      Start time:18:50:37
                                                                                                                                                                                                                                                                                                                                                      Start date:07/10/2024
                                                                                                                                                                                                                                                                                                                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                                                                                                                                                                                                                                      Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5000 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 5012 -prefMapHandle 4976 -prefsLen 33559 -prefMapSize 238472 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62736bf5-4a6a-402e-9ae1-8f0951dc0690} 6016 "\\.\pipe\gecko-crash-server-pipe.6016" 21c1ab7d110 utility
                                                                                                                                                                                                                                                                                                                                                      Imagebase:0x7ff6de060000
                                                                                                                                                                                                                                                                                                                                                      File size:676'768 bytes
                                                                                                                                                                                                                                                                                                                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                                                                                                                                      Has elevated privileges:false
                                                                                                                                                                                                                                                                                                                                                      Has administrator privileges:false
                                                                                                                                                                                                                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                                                                                                                                                                                                                      Reputation:high
                                                                                                                                                                                                                                                                                                                                                      Has exited:false

                                                                                                                                                                                                                                                                                                                                                      Reset < >

                                                                                                                                                                                                                                                                                                                                                        Execution Graph

                                                                                                                                                                                                                                                                                                                                                        Execution Coverage:1.9%
                                                                                                                                                                                                                                                                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                                                                                                                                        Signature Coverage:4.8%
                                                                                                                                                                                                                                                                                                                                                        Total number of Nodes:1504
                                                                                                                                                                                                                                                                                                                                                        Total number of Limit Nodes:55
                                                                                                                                                                                                                                                                                                                                                        execution_graph 95621 7b105b 95626 7b344d 95621->95626 95623 7b106a 95657 7d00a3 29 API calls __onexit 95623->95657 95625 7b1074 95627 7b345d __wsopen_s 95626->95627 95658 7ba961 95627->95658 95631 7b351c 95670 7b3357 95631->95670 95638 7ba961 22 API calls 95639 7b354d 95638->95639 95691 7ba6c3 95639->95691 95642 7f3176 RegQueryValueExW 95643 7f320c RegCloseKey 95642->95643 95644 7f3193 95642->95644 95647 7b3578 95643->95647 95656 7f321e _wcslen 95643->95656 95697 7cfe0b 95644->95697 95646 7f31ac 95707 7b5722 95646->95707 95647->95623 95648 7b4c6d 22 API calls 95648->95656 95651 7f31d4 95710 7b6b57 95651->95710 95653 7f31ee ISource 95653->95643 95655 7b515f 22 API calls 95655->95656 95656->95647 95656->95648 95656->95655 95722 7b9cb3 95656->95722 95657->95625 95659 7cfe0b 22 API calls 95658->95659 95660 7ba976 95659->95660 95728 7cfddb 95660->95728 95662 7b3513 95663 7b3a5a 95662->95663 95750 7f1f50 95663->95750 95666 7b9cb3 22 API calls 95667 7b3a8d 95666->95667 95752 7b3aa2 95667->95752 95669 7b3a97 95669->95631 95671 7f1f50 __wsopen_s 95670->95671 95672 7b3364 GetFullPathNameW 95671->95672 95673 7b3386 95672->95673 95674 7b6b57 22 API calls 95673->95674 95675 7b33a4 95674->95675 95676 7b33c6 95675->95676 95677 7f30bb 95676->95677 95678 7b33dd 95676->95678 95680 7cfddb 22 API calls 95677->95680 95776 7b33ee 95678->95776 95682 7f30c5 _wcslen 95680->95682 95681 7b33e8 95685 7b515f 95681->95685 95683 7cfe0b 22 API calls 95682->95683 95684 7f30fe __fread_nolock 95683->95684 95686 7b516e 95685->95686 95690 7b518f __fread_nolock 95685->95690 95688 7cfe0b 22 API calls 95686->95688 95687 7cfddb 22 API calls 95689 7b3544 95687->95689 95688->95690 95689->95638 95690->95687 95692 7ba6dd 95691->95692 95693 7b3556 RegOpenKeyExW 95691->95693 95694 7cfddb 22 API calls 95692->95694 95693->95642 95693->95647 95695 7ba6e7 95694->95695 95696 7cfe0b 22 API calls 95695->95696 95696->95693 95700 7cfddb 95697->95700 95698 7dea0c ___std_exception_copy 21 API calls 95698->95700 95699 7cfdfa 95699->95646 95700->95698 95700->95699 95702 7cfdfc 95700->95702 95791 7d4ead 7 API calls 2 library calls 95700->95791 95703 7d066d 95702->95703 95792 7d32a4 RaiseException 95702->95792 95793 7d32a4 RaiseException 95703->95793 95705 7d068a 95705->95646 95708 7cfddb 22 API calls 95707->95708 95709 7b5734 RegQueryValueExW 95708->95709 95709->95651 95709->95653 95711 7b6b67 _wcslen 95710->95711 95712 7f4ba1 95710->95712 95715 7b6b7d 95711->95715 95716 7b6ba2 95711->95716 95713 7b93b2 22 API calls 95712->95713 95714 7f4baa 95713->95714 95714->95714 95794 7b6f34 22 API calls 95715->95794 95718 7cfddb 22 API calls 95716->95718 95720 7b6bae 95718->95720 95719 7b6b85 __fread_nolock 95719->95653 95721 7cfe0b 22 API calls 95720->95721 95721->95719 95723 7b9cc2 _wcslen 95722->95723 95724 7cfe0b 22 API calls 95723->95724 95725 7b9cea __fread_nolock 95724->95725 95726 7cfddb 22 API calls 95725->95726 95727 7b9d00 95726->95727 95727->95656 95731 7cfde0 95728->95731 95730 7cfdfa 95730->95662 95731->95730 95734 7cfdfc 95731->95734 95738 7dea0c 95731->95738 95745 7d4ead 7 API calls 2 library calls 95731->95745 95733 7d066d 95747 7d32a4 RaiseException 95733->95747 95734->95733 95746 7d32a4 RaiseException 95734->95746 95736 7d068a 95736->95662 95744 7e3820 _abort 95738->95744 95739 7e385e 95749 7df2d9 20 API calls _abort 95739->95749 95741 7e3849 RtlAllocateHeap 95742 7e385c 95741->95742 95741->95744 95742->95731 95744->95739 95744->95741 95748 7d4ead 7 API calls 2 library calls 95744->95748 95745->95731 95746->95733 95747->95736 95748->95744 95749->95742 95751 7b3a67 GetModuleFileNameW 95750->95751 95751->95666 95753 7f1f50 __wsopen_s 95752->95753 95754 7b3aaf GetFullPathNameW 95753->95754 95755 7b3ae9 95754->95755 95756 7b3ace 95754->95756 95758 7ba6c3 22 API calls 95755->95758 95757 7b6b57 22 API calls 95756->95757 95759 7b3ada 95757->95759 95758->95759 95762 7b37a0 95759->95762 95763 7b37ae 95762->95763 95766 7b93b2 95763->95766 95765 7b37c2 95765->95669 95767 7b93c9 __fread_nolock 95766->95767 95768 7b93c0 95766->95768 95767->95765 95768->95767 95770 7baec9 95768->95770 95771 7baedc 95770->95771 95775 7baed9 __fread_nolock 95770->95775 95772 7cfddb 22 API calls 95771->95772 95773 7baee7 95772->95773 95774 7cfe0b 22 API calls 95773->95774 95774->95775 95775->95767 95777 7b33fe _wcslen 95776->95777 95778 7f311d 95777->95778 95779 7b3411 95777->95779 95781 7cfddb 22 API calls 95778->95781 95786 7ba587 95779->95786 95782 7f3127 95781->95782 95784 7cfe0b 22 API calls 95782->95784 95783 7b341e __fread_nolock 95783->95681 95785 7f3157 __fread_nolock 95784->95785 95787 7ba59d 95786->95787 95790 7ba598 __fread_nolock 95786->95790 95788 7cfe0b 22 API calls 95787->95788 95789 7ff80f 95787->95789 95788->95790 95789->95789 95790->95783 95791->95700 95792->95703 95793->95705 95794->95719 95795 802a00 95811 7bd7b0 ISource 95795->95811 95796 7bdb11 PeekMessageW 95796->95811 95797 7bd807 GetInputState 95797->95796 95797->95811 95799 801cbe TranslateAcceleratorW 95799->95811 95800 7bdb8f PeekMessageW 95800->95811 95801 7bda04 timeGetTime 95801->95811 95802 7bdb73 TranslateMessage DispatchMessageW 95802->95800 95803 7bdbaf Sleep 95803->95811 95804 802b74 Sleep 95817 802a51 95804->95817 95807 801dda timeGetTime 95954 7ce300 23 API calls 95807->95954 95810 802c0b GetExitCodeProcess 95812 802c21 WaitForSingleObject 95810->95812 95813 802c37 CloseHandle 95810->95813 95811->95796 95811->95797 95811->95799 95811->95800 95811->95801 95811->95802 95811->95803 95811->95804 95811->95807 95815 7bd9d5 95811->95815 95811->95817 95827 7bdd50 95811->95827 95834 7c1310 95811->95834 95889 7cedf6 95811->95889 95894 7bdfd0 348 API calls 3 library calls 95811->95894 95895 7bbf40 95811->95895 95953 7ce551 timeGetTime 95811->95953 95955 823a2a 23 API calls 95811->95955 95956 7bec40 95811->95956 95980 82359c 82 API calls __wsopen_s 95811->95980 95812->95811 95812->95813 95813->95817 95814 8429bf GetForegroundWindow 95814->95817 95817->95810 95817->95811 95817->95814 95817->95815 95818 802ca9 Sleep 95817->95818 95981 835658 23 API calls 95817->95981 95982 81e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95817->95982 95983 7ce551 timeGetTime 95817->95983 95984 81d4dc CreateToolhelp32Snapshot Process32FirstW 95817->95984 95818->95811 95828 7bdd6f 95827->95828 95829 7bdd83 95827->95829 95994 7bd260 95828->95994 96026 82359c 82 API calls __wsopen_s 95829->96026 95832 7bdd7a 95832->95811 95833 802f75 95833->95833 95835 7c1376 95834->95835 95836 7c17b0 95834->95836 95837 806331 95835->95837 95838 7c1390 95835->95838 96067 7d0242 5 API calls __Init_thread_wait 95836->96067 96072 83709c 348 API calls 95837->96072 96036 7c1940 95838->96036 95842 7c17ba 95845 7c17fb 95842->95845 95847 7b9cb3 22 API calls 95842->95847 95844 80633d 95844->95811 95849 806346 95845->95849 95851 7c182c 95845->95851 95846 7c1940 9 API calls 95848 7c13b6 95846->95848 95854 7c17d4 95847->95854 95848->95845 95850 7c13ec 95848->95850 96073 82359c 82 API calls __wsopen_s 95849->96073 95850->95849 95874 7c1408 __fread_nolock 95850->95874 96069 7baceb 23 API calls ISource 95851->96069 96068 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95854->96068 95856 7c1839 96070 7cd217 348 API calls 95856->96070 95858 80636e 96074 82359c 82 API calls __wsopen_s 95858->96074 95859 7c152f 95861 7c153c 95859->95861 95862 8063d1 95859->95862 95864 7c1940 9 API calls 95861->95864 96076 835745 54 API calls _wcslen 95862->96076 95865 7c1549 95864->95865 95869 8064fa 95865->95869 95871 7c1940 9 API calls 95865->95871 95866 7cfddb 22 API calls 95866->95874 95867 7c1872 96071 7cfaeb 23 API calls 95867->96071 95868 7cfe0b 22 API calls 95868->95874 95878 806369 95869->95878 96078 82359c 82 API calls __wsopen_s 95869->96078 95876 7c1563 95871->95876 95873 7bec40 348 API calls 95873->95874 95874->95856 95874->95858 95874->95859 95874->95866 95874->95868 95874->95873 95875 8063b2 95874->95875 95874->95878 96075 82359c 82 API calls __wsopen_s 95875->96075 95876->95869 95881 7c15c7 ISource 95876->95881 96077 7ba8c7 22 API calls __fread_nolock 95876->96077 95878->95811 95880 7c1940 9 API calls 95880->95881 95881->95867 95881->95869 95881->95878 95881->95880 95883 7c167b ISource 95881->95883 96046 83a2ea 95881->96046 96051 825c5a 95881->96051 96056 7cf645 95881->96056 96063 83ab67 95881->96063 95882 7c171d 95882->95811 95883->95882 96066 7cce17 22 API calls ISource 95883->96066 95890 7cee09 95889->95890 95891 7cee12 95889->95891 95890->95811 95891->95890 95892 7cee36 IsDialogMessageW 95891->95892 95893 80efaf GetClassLongW 95891->95893 95892->95890 95892->95891 95893->95891 95893->95892 95894->95811 96228 7badf0 95895->96228 95897 7bbf9d 95898 7bbfa9 95897->95898 95899 8004b6 95897->95899 95901 7bc01e 95898->95901 95902 8004c6 95898->95902 96247 82359c 82 API calls __wsopen_s 95899->96247 96233 7bac91 95901->96233 96248 82359c 82 API calls __wsopen_s 95902->96248 95906 7bc7da 95909 7cfe0b 22 API calls 95906->95909 95914 7bc808 __fread_nolock 95909->95914 95911 8004f5 95917 80055a 95911->95917 96249 7cd217 348 API calls 95911->96249 95918 7cfe0b 22 API calls 95914->95918 95915 7cfddb 22 API calls 95951 7bc039 ISource __fread_nolock 95915->95951 95916 7baf8a 22 API calls 95916->95951 95937 7bc603 95917->95937 96250 82359c 82 API calls __wsopen_s 95917->96250 95950 7bc350 ISource __fread_nolock 95918->95950 95919 817120 22 API calls 95919->95951 95920 80091a 96260 823209 23 API calls 95920->96260 95923 7bec40 348 API calls 95923->95951 95924 8008a5 95925 7bec40 348 API calls 95924->95925 95927 8008cf 95925->95927 95927->95937 96258 7ba81b 41 API calls 95927->96258 95928 800591 96251 82359c 82 API calls __wsopen_s 95928->96251 95929 8008f6 96259 82359c 82 API calls __wsopen_s 95929->96259 95935 7bc237 95936 7bc253 95935->95936 96261 7ba8c7 22 API calls __fread_nolock 95935->96261 95940 800976 95936->95940 95944 7bc297 ISource 95936->95944 95937->95811 95938 7cfe0b 22 API calls 95938->95951 96262 7baceb 23 API calls ISource 95940->96262 95943 8009bf 95943->95937 96263 82359c 82 API calls __wsopen_s 95943->96263 95944->95943 96244 7baceb 23 API calls ISource 95944->96244 95946 7bc335 95946->95943 95947 7bc342 95946->95947 96245 7ba704 22 API calls ISource 95947->96245 95948 7bbbe0 40 API calls 95948->95951 95952 7bc3ac 95950->95952 96246 7cce17 22 API calls ISource 95950->96246 95951->95906 95951->95911 95951->95914 95951->95915 95951->95916 95951->95917 95951->95919 95951->95920 95951->95923 95951->95924 95951->95928 95951->95929 95951->95935 95951->95937 95951->95938 95951->95943 95951->95948 96237 7bad81 95951->96237 96252 817099 22 API calls __fread_nolock 95951->96252 96253 835745 54 API calls _wcslen 95951->96253 96254 7caa42 22 API calls ISource 95951->96254 96255 81f05c 40 API calls 95951->96255 96256 7ba993 41 API calls 95951->96256 96257 7baceb 23 API calls ISource 95951->96257 95952->95811 95953->95811 95954->95811 95955->95811 95957 7bec76 ISource 95956->95957 95958 804beb 95957->95958 95960 7bed9d ISource 95957->95960 95962 7cfddb 22 API calls 95957->95962 95963 7bf3ae ISource 95957->95963 95964 7bfef7 95957->95964 95965 804600 95957->95965 95966 804b0b 95957->95966 95967 7ba8c7 22 API calls 95957->95967 95971 7d0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95957->95971 95974 7bfbe3 95957->95974 95975 7ba961 22 API calls 95957->95975 95977 7d00a3 29 API calls pre_c_initialization 95957->95977 95979 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95957->95979 96273 7c01e0 348 API calls 2 library calls 95957->96273 96274 7c06a0 41 API calls ISource 95957->96274 96280 82359c 82 API calls __wsopen_s 95958->96280 95960->95811 95962->95957 95963->95960 96277 82359c 82 API calls __wsopen_s 95963->96277 95964->95960 96276 7ba8c7 22 API calls __fread_nolock 95964->96276 95965->95960 96275 7ba8c7 22 API calls __fread_nolock 95965->96275 96278 82359c 82 API calls __wsopen_s 95966->96278 95967->95957 95971->95957 95974->95960 95974->95963 95976 804bdc 95974->95976 95975->95957 96279 82359c 82 API calls __wsopen_s 95976->96279 95977->95957 95979->95957 95980->95811 95981->95817 95982->95817 95983->95817 96281 81def7 95984->96281 95986 81d529 Process32NextW 95987 81d5db CloseHandle 95986->95987 95989 81d522 95986->95989 95987->95817 95988 7ba961 22 API calls 95988->95989 95989->95986 95989->95987 95989->95988 95990 7b9cb3 22 API calls 95989->95990 96287 7b525f 22 API calls 95989->96287 96288 7b6350 22 API calls 95989->96288 96289 7cce60 41 API calls 95989->96289 95990->95989 95995 7bec40 348 API calls 95994->95995 96015 7bd29d 95995->96015 95996 801bc4 96035 82359c 82 API calls __wsopen_s 95996->96035 95998 7bd30b ISource 95998->95832 95999 7bd3c3 96001 7bd3ce 95999->96001 96002 7bd6d5 95999->96002 96000 7bd5ff 96004 801bb5 96000->96004 96005 7bd614 96000->96005 96003 7cfddb 22 API calls 96001->96003 96002->95998 96010 7cfe0b 22 API calls 96002->96010 96014 7bd3d5 __fread_nolock 96003->96014 96034 835705 23 API calls 96004->96034 96008 7cfddb 22 API calls 96005->96008 96006 7bd4b8 96011 7cfe0b 22 API calls 96006->96011 96019 7bd46a 96008->96019 96009 7cfddb 22 API calls 96009->96015 96010->96014 96021 7bd429 ISource __fread_nolock 96011->96021 96012 7cfddb 22 API calls 96013 7bd3f6 96012->96013 96013->96021 96027 7bbec0 348 API calls 96013->96027 96014->96012 96014->96013 96015->95996 96015->95998 96015->95999 96015->96002 96015->96006 96015->96009 96015->96021 96017 801ba4 96033 82359c 82 API calls __wsopen_s 96017->96033 96019->95832 96021->96000 96021->96017 96021->96019 96022 801b7f 96021->96022 96024 801b5d 96021->96024 96028 7b1f6f 96021->96028 96032 82359c 82 API calls __wsopen_s 96022->96032 96031 82359c 82 API calls __wsopen_s 96024->96031 96026->95833 96027->96021 96029 7bec40 348 API calls 96028->96029 96030 7b1f98 96029->96030 96030->96021 96031->96019 96032->96019 96033->96019 96034->95996 96035->95998 96037 7c1981 96036->96037 96044 7c195d 96036->96044 96079 7d0242 5 API calls __Init_thread_wait 96037->96079 96038 7c13a0 96038->95846 96041 7c198b 96041->96044 96080 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96041->96080 96042 7c8727 96042->96038 96082 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96042->96082 96044->96038 96081 7d0242 5 API calls __Init_thread_wait 96044->96081 96083 7b7510 96046->96083 96049 81d4dc 47 API calls 96050 83a315 96049->96050 96050->95881 96052 7b7510 53 API calls 96051->96052 96053 825c6d 96052->96053 96110 81dbbe lstrlenW 96053->96110 96055 825c77 96055->95881 96115 7bb567 96056->96115 96058 7cf659 96059 80f2dc Sleep 96058->96059 96060 7cf661 timeGetTime 96058->96060 96061 7bb567 39 API calls 96060->96061 96062 7cf677 96061->96062 96062->95881 96121 83aff9 96063->96121 96066->95883 96067->95842 96068->95845 96069->95856 96070->95867 96071->95867 96072->95844 96073->95878 96074->95878 96075->95878 96076->95876 96077->95881 96078->95878 96079->96041 96080->96044 96081->96042 96082->96038 96084 7b7525 96083->96084 96099 7b7522 96083->96099 96085 7b755b 96084->96085 96086 7b752d 96084->96086 96087 7f50f6 96085->96087 96090 7b756d 96085->96090 96097 7f500f 96085->96097 96106 7d51c6 26 API calls 96086->96106 96109 7d5183 26 API calls 96087->96109 96107 7cfb21 51 API calls 96090->96107 96091 7b753d 96095 7cfddb 22 API calls 96091->96095 96092 7f510e 96092->96092 96096 7b7547 96095->96096 96098 7b9cb3 22 API calls 96096->96098 96100 7cfe0b 22 API calls 96097->96100 96105 7f5088 96097->96105 96098->96099 96099->96049 96101 7f5058 96100->96101 96102 7cfddb 22 API calls 96101->96102 96103 7f507f 96102->96103 96104 7b9cb3 22 API calls 96103->96104 96104->96105 96108 7cfb21 51 API calls 96105->96108 96106->96091 96107->96091 96108->96087 96109->96092 96111 81dbdc GetFileAttributesW 96110->96111 96112 81dc06 96110->96112 96111->96112 96113 81dbe8 FindFirstFileW 96111->96113 96112->96055 96113->96112 96114 81dbf9 FindClose 96113->96114 96114->96112 96116 7bb578 96115->96116 96117 7bb57f 96115->96117 96116->96117 96120 7d62d1 39 API calls _strftime 96116->96120 96117->96058 96119 7bb5c2 96119->96058 96120->96119 96122 83b01d ___scrt_fastfail 96121->96122 96123 83b094 96122->96123 96124 83b058 96122->96124 96128 7bb567 39 API calls 96123->96128 96129 83b08b 96123->96129 96125 7bb567 39 API calls 96124->96125 96126 83b063 96125->96126 96126->96129 96132 7bb567 39 API calls 96126->96132 96127 83b0ed 96130 7b7510 53 API calls 96127->96130 96131 83b0a5 96128->96131 96129->96127 96133 7bb567 39 API calls 96129->96133 96134 83b10b 96130->96134 96135 7bb567 39 API calls 96131->96135 96136 83b078 96132->96136 96133->96127 96212 7b7620 96134->96212 96135->96129 96139 7bb567 39 API calls 96136->96139 96138 83b115 96140 83b1d8 96138->96140 96141 83b11f 96138->96141 96139->96129 96143 83b20a GetCurrentDirectoryW 96140->96143 96146 7b7510 53 API calls 96140->96146 96142 7b7510 53 API calls 96141->96142 96144 83b130 96142->96144 96145 7cfe0b 22 API calls 96143->96145 96147 7b7620 22 API calls 96144->96147 96148 83b22f GetCurrentDirectoryW 96145->96148 96149 83b1ef 96146->96149 96150 83b13a 96147->96150 96151 83b23c 96148->96151 96152 7b7620 22 API calls 96149->96152 96153 7b7510 53 API calls 96150->96153 96156 83b275 96151->96156 96216 7b9c6e 22 API calls 96151->96216 96154 83b1f9 _wcslen 96152->96154 96155 83b14b 96153->96155 96154->96143 96154->96156 96157 7b7620 22 API calls 96155->96157 96161 83b287 96156->96161 96162 83b28b 96156->96162 96159 83b155 96157->96159 96163 7b7510 53 API calls 96159->96163 96160 83b255 96217 7b9c6e 22 API calls 96160->96217 96169 83b39a CreateProcessW 96161->96169 96170 83b2f8 96161->96170 96219 8207c0 10 API calls 96162->96219 96166 83b166 96163->96166 96171 7b7620 22 API calls 96166->96171 96167 83b265 96218 7b9c6e 22 API calls 96167->96218 96168 83b294 96220 8206e6 10 API calls 96168->96220 96211 83b32f _wcslen 96169->96211 96222 8111c8 39 API calls 96170->96222 96175 83b170 96171->96175 96178 83b1a6 GetSystemDirectoryW 96175->96178 96183 7b7510 53 API calls 96175->96183 96176 83b2aa 96221 8205a7 8 API calls 96176->96221 96177 83b2fd 96181 83b323 96177->96181 96182 83b32a 96177->96182 96180 7cfe0b 22 API calls 96178->96180 96187 83b1cb GetSystemDirectoryW 96180->96187 96223 811201 128 API calls 2 library calls 96181->96223 96224 8114ce 6 API calls 96182->96224 96184 83b187 96183->96184 96189 7b7620 22 API calls 96184->96189 96186 83b2d0 96186->96161 96187->96151 96191 83b191 _wcslen 96189->96191 96190 83b328 96190->96211 96191->96151 96191->96178 96192 83b3d6 GetLastError 96201 83b41a 96192->96201 96193 83b42f CloseHandle 96194 83b43f 96193->96194 96202 83b49a 96193->96202 96195 83b451 96194->96195 96196 83b446 CloseHandle 96194->96196 96199 83b463 96195->96199 96200 83b458 CloseHandle 96195->96200 96196->96195 96198 83b4a6 96198->96201 96203 83b475 96199->96203 96204 83b46a CloseHandle 96199->96204 96200->96199 96227 820175 6 API calls 96201->96227 96202->96198 96207 83b4d2 CloseHandle 96202->96207 96225 8209d9 34 API calls 96203->96225 96204->96203 96207->96201 96208 83ab79 96208->95881 96209 83b486 96226 83b536 25 API calls 96209->96226 96211->96192 96211->96193 96213 7b762a _wcslen 96212->96213 96214 7cfe0b 22 API calls 96213->96214 96215 7b763f 96214->96215 96215->96138 96216->96160 96217->96167 96218->96156 96219->96168 96220->96176 96221->96186 96222->96177 96223->96190 96224->96211 96225->96209 96226->96202 96227->96208 96229 7bae01 96228->96229 96232 7bae1c ISource 96228->96232 96230 7baec9 22 API calls 96229->96230 96231 7bae09 CharUpperBuffW 96230->96231 96231->96232 96232->95897 96234 7bacae 96233->96234 96236 7bacd1 96234->96236 96264 82359c 82 API calls __wsopen_s 96234->96264 96236->95951 96238 7ffadb 96237->96238 96239 7bad92 96237->96239 96240 7cfddb 22 API calls 96239->96240 96241 7bad99 96240->96241 96265 7badcd 96241->96265 96244->95946 96245->95950 96246->95950 96247->95902 96248->95937 96249->95917 96250->95937 96251->95937 96252->95951 96253->95951 96254->95951 96255->95951 96256->95951 96257->95951 96258->95929 96259->95937 96260->95935 96261->95936 96262->95943 96263->95937 96264->96236 96271 7baddd 96265->96271 96266 7badb6 96266->95951 96267 7cfddb 22 API calls 96267->96271 96268 7ba961 22 API calls 96268->96271 96270 7badcd 22 API calls 96270->96271 96271->96266 96271->96267 96271->96268 96271->96270 96272 7ba8c7 22 API calls __fread_nolock 96271->96272 96272->96271 96273->95957 96274->95957 96275->95960 96276->95960 96277->95960 96278->95960 96279->95958 96280->95960 96282 81df02 96281->96282 96283 81df19 96282->96283 96286 81df1f 96282->96286 96290 7d63b2 GetStringTypeW _strftime 96282->96290 96291 7d62fb 39 API calls _strftime 96283->96291 96286->95989 96287->95989 96288->95989 96289->95989 96290->96282 96291->96286 96292 7b1098 96297 7b42de 96292->96297 96296 7b10a7 96298 7ba961 22 API calls 96297->96298 96299 7b42f5 GetVersionExW 96298->96299 96300 7b6b57 22 API calls 96299->96300 96301 7b4342 96300->96301 96302 7b93b2 22 API calls 96301->96302 96312 7b4378 96301->96312 96303 7b436c 96302->96303 96305 7b37a0 22 API calls 96303->96305 96304 7b441b GetCurrentProcess IsWow64Process 96306 7b4437 96304->96306 96305->96312 96307 7b444f LoadLibraryA 96306->96307 96308 7f3824 GetSystemInfo 96306->96308 96309 7b449c GetSystemInfo 96307->96309 96310 7b4460 GetProcAddress 96307->96310 96311 7b4476 96309->96311 96310->96309 96314 7b4470 GetNativeSystemInfo 96310->96314 96315 7b447a FreeLibrary 96311->96315 96316 7b109d 96311->96316 96312->96304 96313 7f37df 96312->96313 96314->96311 96315->96316 96317 7d00a3 29 API calls __onexit 96316->96317 96317->96296 96318 7bf7bf 96319 7bf7d3 96318->96319 96320 7bfcb6 96318->96320 96322 7bfcc2 96319->96322 96323 7cfddb 22 API calls 96319->96323 96355 7baceb 23 API calls ISource 96320->96355 96356 7baceb 23 API calls ISource 96322->96356 96325 7bf7e5 96323->96325 96325->96322 96326 7bf83e 96325->96326 96327 7bfd3d 96325->96327 96329 7c1310 348 API calls 96326->96329 96339 7bed9d ISource 96326->96339 96357 821155 22 API calls 96327->96357 96350 7bec76 ISource 96329->96350 96330 7bfef7 96330->96339 96359 7ba8c7 22 API calls __fread_nolock 96330->96359 96333 804600 96333->96339 96358 7ba8c7 22 API calls __fread_nolock 96333->96358 96334 804b0b 96361 82359c 82 API calls __wsopen_s 96334->96361 96341 7ba8c7 22 API calls 96341->96350 96342 7d0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96342->96350 96343 7bfbe3 96343->96339 96345 804bdc 96343->96345 96352 7bf3ae ISource 96343->96352 96344 7ba961 22 API calls 96344->96350 96362 82359c 82 API calls __wsopen_s 96345->96362 96347 804beb 96363 82359c 82 API calls __wsopen_s 96347->96363 96348 7d01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96348->96350 96349 7d00a3 29 API calls pre_c_initialization 96349->96350 96350->96330 96350->96333 96350->96334 96350->96339 96350->96341 96350->96342 96350->96343 96350->96344 96350->96347 96350->96348 96350->96349 96351 7cfddb 22 API calls 96350->96351 96350->96352 96353 7c01e0 348 API calls 2 library calls 96350->96353 96354 7c06a0 41 API calls ISource 96350->96354 96351->96350 96352->96339 96360 82359c 82 API calls __wsopen_s 96352->96360 96353->96350 96354->96350 96355->96322 96356->96327 96357->96339 96358->96339 96359->96339 96360->96339 96361->96339 96362->96347 96363->96339 96364 7d03fb 96365 7d0407 ___DestructExceptionObject 96364->96365 96393 7cfeb1 96365->96393 96367 7d040e 96368 7d0561 96367->96368 96371 7d0438 96367->96371 96423 7d083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96368->96423 96370 7d0568 96416 7d4e52 96370->96416 96380 7d0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96371->96380 96404 7e247d 96371->96404 96378 7d0457 96381 7d04d8 96380->96381 96419 7d4e1a 38 API calls 2 library calls 96380->96419 96412 7d0959 96381->96412 96384 7d04de 96385 7d04f3 96384->96385 96420 7d0992 GetModuleHandleW 96385->96420 96387 7d04fa 96387->96370 96388 7d04fe 96387->96388 96389 7d0507 96388->96389 96421 7d4df5 28 API calls _abort 96388->96421 96422 7d0040 13 API calls 2 library calls 96389->96422 96392 7d050f 96392->96378 96394 7cfeba 96393->96394 96425 7d0698 IsProcessorFeaturePresent 96394->96425 96396 7cfec6 96426 7d2c94 10 API calls 3 library calls 96396->96426 96398 7cfecb 96399 7cfecf 96398->96399 96427 7e2317 96398->96427 96399->96367 96402 7cfee6 96402->96367 96407 7e2494 96404->96407 96405 7d0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96406 7d0451 96405->96406 96406->96378 96408 7e2421 96406->96408 96407->96405 96411 7e2450 96408->96411 96409 7d0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96410 7e2479 96409->96410 96410->96380 96411->96409 96496 7d2340 96412->96496 96415 7d097f 96415->96384 96498 7d4bcf 96416->96498 96419->96381 96420->96387 96421->96389 96422->96392 96423->96370 96425->96396 96426->96398 96431 7ed1f6 96427->96431 96430 7d2cbd 8 API calls 3 library calls 96430->96399 96434 7ed213 96431->96434 96435 7ed20f 96431->96435 96433 7cfed8 96433->96402 96433->96430 96434->96435 96437 7e4bfb 96434->96437 96449 7d0a8c 96435->96449 96438 7e4c07 ___DestructExceptionObject 96437->96438 96456 7e2f5e EnterCriticalSection 96438->96456 96440 7e4c0e 96457 7e50af 96440->96457 96442 7e4c1d 96448 7e4c2c 96442->96448 96470 7e4a8f 29 API calls 96442->96470 96445 7e4c27 96471 7e4b45 GetStdHandle GetFileType 96445->96471 96446 7e4c3d __wsopen_s 96446->96434 96472 7e4c48 LeaveCriticalSection _abort 96448->96472 96450 7d0a95 96449->96450 96451 7d0a97 IsProcessorFeaturePresent 96449->96451 96450->96433 96453 7d0c5d 96451->96453 96495 7d0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96453->96495 96455 7d0d40 96455->96433 96456->96440 96458 7e50bb ___DestructExceptionObject 96457->96458 96459 7e50df 96458->96459 96460 7e50c8 96458->96460 96473 7e2f5e EnterCriticalSection 96459->96473 96481 7df2d9 20 API calls _abort 96460->96481 96463 7e50eb 96469 7e5117 96463->96469 96474 7e5000 96463->96474 96464 7e50cd 96482 7e27ec 26 API calls __wsopen_s 96464->96482 96466 7e50d7 __wsopen_s 96466->96442 96483 7e513e LeaveCriticalSection _abort 96469->96483 96470->96445 96471->96448 96472->96446 96473->96463 96484 7e4c7d 96474->96484 96476 7e501f 96492 7e29c8 20 API calls __dosmaperr 96476->96492 96478 7e5012 96478->96476 96491 7e3405 11 API calls 2 library calls 96478->96491 96479 7e5071 96479->96463 96481->96464 96482->96466 96483->96466 96489 7e4c8a _abort 96484->96489 96485 7e4cca 96494 7df2d9 20 API calls _abort 96485->96494 96486 7e4cb5 RtlAllocateHeap 96487 7e4cc8 96486->96487 96486->96489 96487->96478 96489->96485 96489->96486 96493 7d4ead 7 API calls 2 library calls 96489->96493 96491->96478 96492->96479 96493->96489 96494->96487 96495->96455 96497 7d096c GetStartupInfoW 96496->96497 96497->96415 96499 7d4bdb _abort 96498->96499 96500 7d4bf4 96499->96500 96501 7d4be2 96499->96501 96522 7e2f5e EnterCriticalSection 96500->96522 96537 7d4d29 GetModuleHandleW 96501->96537 96504 7d4be7 96504->96500 96538 7d4d6d GetModuleHandleExW 96504->96538 96505 7d4c99 96526 7d4cd9 96505->96526 96509 7d4bfb 96509->96505 96511 7d4c70 96509->96511 96523 7e21a8 96509->96523 96512 7d4c88 96511->96512 96517 7e2421 _abort 5 API calls 96511->96517 96518 7e2421 _abort 5 API calls 96512->96518 96513 7d4cb6 96529 7d4ce8 96513->96529 96514 7d4ce2 96546 7f1d29 5 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 96514->96546 96517->96512 96518->96505 96522->96509 96547 7e1ee1 96523->96547 96567 7e2fa6 LeaveCriticalSection 96526->96567 96528 7d4cb2 96528->96513 96528->96514 96568 7e360c 96529->96568 96532 7d4d16 96535 7d4d6d _abort 8 API calls 96532->96535 96533 7d4cf6 GetPEB 96533->96532 96534 7d4d06 GetCurrentProcess TerminateProcess 96533->96534 96534->96532 96536 7d4d1e ExitProcess 96535->96536 96537->96504 96539 7d4dba 96538->96539 96540 7d4d97 GetProcAddress 96538->96540 96541 7d4dc9 96539->96541 96542 7d4dc0 FreeLibrary 96539->96542 96545 7d4dac 96540->96545 96543 7d0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96541->96543 96542->96541 96544 7d4bf3 96543->96544 96544->96500 96545->96539 96550 7e1e90 96547->96550 96549 7e1f05 96549->96511 96551 7e1e9c ___DestructExceptionObject 96550->96551 96558 7e2f5e EnterCriticalSection 96551->96558 96553 7e1eaa 96559 7e1f31 96553->96559 96557 7e1ec8 __wsopen_s 96557->96549 96558->96553 96562 7e1f59 96559->96562 96564 7e1f51 96559->96564 96560 7d0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96561 7e1eb7 96560->96561 96565 7e1ed5 LeaveCriticalSection _abort 96561->96565 96562->96564 96566 7e29c8 20 API calls __dosmaperr 96562->96566 96564->96560 96565->96557 96566->96564 96567->96528 96569 7e3627 96568->96569 96570 7e3631 96568->96570 96572 7d0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96569->96572 96575 7e2fd7 5 API calls 2 library calls 96570->96575 96574 7d4cf2 96572->96574 96573 7e3648 96573->96569 96574->96532 96574->96533 96575->96573 96576 7bdefc 96579 7b1d6f 96576->96579 96578 7bdf07 96580 7b1d8c 96579->96580 96581 7b1f6f 348 API calls 96580->96581 96582 7b1da6 96581->96582 96583 7f2759 96582->96583 96585 7b1e36 96582->96585 96586 7b1dc2 96582->96586 96589 82359c 82 API calls __wsopen_s 96583->96589 96585->96578 96586->96585 96588 7b289a 23 API calls 96586->96588 96588->96585 96589->96585 96590 7b1033 96595 7b4c91 96590->96595 96594 7b1042 96596 7ba961 22 API calls 96595->96596 96597 7b4cff 96596->96597 96603 7b3af0 96597->96603 96599 7b4d9c 96601 7b1038 96599->96601 96606 7b51f7 22 API calls __fread_nolock 96599->96606 96602 7d00a3 29 API calls __onexit 96601->96602 96602->96594 96607 7b3b1c 96603->96607 96606->96599 96608 7b3b0f 96607->96608 96609 7b3b29 96607->96609 96608->96599 96609->96608 96610 7b3b30 RegOpenKeyExW 96609->96610 96610->96608 96611 7b3b4a RegQueryValueExW 96610->96611 96612 7b3b80 RegCloseKey 96611->96612 96613 7b3b6b 96611->96613 96612->96608 96613->96612 96614 7b2e37 96615 7ba961 22 API calls 96614->96615 96616 7b2e4d 96615->96616 96693 7b4ae3 96616->96693 96618 7b2e6b 96619 7b3a5a 24 API calls 96618->96619 96620 7b2e7f 96619->96620 96621 7b9cb3 22 API calls 96620->96621 96622 7b2e8c 96621->96622 96707 7b4ecb 96622->96707 96625 7f2cb0 96747 822cf9 96625->96747 96627 7f2cc3 96629 7f2ccf 96627->96629 96773 7b4f39 96627->96773 96628 7b2ead 96729 7ba8c7 22 API calls __fread_nolock 96628->96729 96634 7b4f39 68 API calls 96629->96634 96632 7b2ec3 96730 7b6f88 22 API calls 96632->96730 96636 7f2ce5 96634->96636 96635 7b2ecf 96637 7b9cb3 22 API calls 96635->96637 96779 7b3084 22 API calls 96636->96779 96638 7b2edc 96637->96638 96731 7ba81b 41 API calls 96638->96731 96640 7b2eec 96643 7b9cb3 22 API calls 96640->96643 96642 7f2d02 96780 7b3084 22 API calls 96642->96780 96645 7b2f12 96643->96645 96732 7ba81b 41 API calls 96645->96732 96646 7f2d1e 96648 7b3a5a 24 API calls 96646->96648 96649 7f2d44 96648->96649 96781 7b3084 22 API calls 96649->96781 96650 7b2f21 96653 7ba961 22 API calls 96650->96653 96652 7f2d50 96782 7ba8c7 22 API calls __fread_nolock 96652->96782 96655 7b2f3f 96653->96655 96733 7b3084 22 API calls 96655->96733 96656 7f2d5e 96783 7b3084 22 API calls 96656->96783 96659 7b2f4b 96734 7d4a28 40 API calls 3 library calls 96659->96734 96661 7f2d6d 96784 7ba8c7 22 API calls __fread_nolock 96661->96784 96662 7b2f59 96662->96636 96663 7b2f63 96662->96663 96735 7d4a28 40 API calls 3 library calls 96663->96735 96666 7b2f6e 96666->96642 96669 7b2f78 96666->96669 96667 7f2d83 96785 7b3084 22 API calls 96667->96785 96736 7d4a28 40 API calls 3 library calls 96669->96736 96670 7f2d90 96672 7b2f83 96672->96646 96673 7b2f8d 96672->96673 96737 7d4a28 40 API calls 3 library calls 96673->96737 96675 7b2f98 96676 7b2fdc 96675->96676 96738 7b3084 22 API calls 96675->96738 96676->96661 96677 7b2fe8 96676->96677 96677->96670 96741 7b63eb 22 API calls 96677->96741 96680 7b2fbf 96739 7ba8c7 22 API calls __fread_nolock 96680->96739 96682 7b2ff8 96742 7b6a50 22 API calls 96682->96742 96683 7b2fcd 96740 7b3084 22 API calls 96683->96740 96686 7b3006 96743 7b70b0 23 API calls 96686->96743 96690 7b3021 96691 7b3065 96690->96691 96744 7b6f88 22 API calls 96690->96744 96745 7b70b0 23 API calls 96690->96745 96746 7b3084 22 API calls 96690->96746 96694 7b4af0 __wsopen_s 96693->96694 96695 7b6b57 22 API calls 96694->96695 96696 7b4b22 96694->96696 96695->96696 96702 7b4b58 96696->96702 96786 7b4c6d 96696->96786 96698 7b4c29 96699 7b9cb3 22 API calls 96698->96699 96706 7b4c5e 96698->96706 96701 7b4c52 96699->96701 96700 7b9cb3 22 API calls 96700->96702 96703 7b515f 22 API calls 96701->96703 96702->96698 96702->96700 96704 7b4c6d 22 API calls 96702->96704 96705 7b515f 22 API calls 96702->96705 96703->96706 96704->96702 96705->96702 96706->96618 96789 7b4e90 LoadLibraryA 96707->96789 96712 7f3ccf 96715 7b4f39 68 API calls 96712->96715 96713 7b4ef6 LoadLibraryExW 96797 7b4e59 LoadLibraryA 96713->96797 96717 7f3cd6 96715->96717 96719 7b4e59 3 API calls 96717->96719 96720 7f3cde 96719->96720 96819 7b50f5 40 API calls __fread_nolock 96720->96819 96721 7b4f20 96721->96720 96722 7b4f2c 96721->96722 96724 7b4f39 68 API calls 96722->96724 96726 7b2ea5 96724->96726 96725 7f3cf5 96820 8228fe 27 API calls 96725->96820 96726->96625 96726->96628 96728 7f3d05 96729->96632 96730->96635 96731->96640 96732->96650 96733->96659 96734->96662 96735->96666 96736->96672 96737->96675 96738->96680 96739->96683 96740->96676 96741->96682 96742->96686 96743->96690 96744->96690 96745->96690 96746->96690 96748 822d15 96747->96748 96885 7b511f 64 API calls 96748->96885 96750 822d29 96886 822e66 75 API calls 96750->96886 96752 822d3b 96770 822d3f 96752->96770 96887 7b50f5 40 API calls __fread_nolock 96752->96887 96754 822d56 96888 7b50f5 40 API calls __fread_nolock 96754->96888 96756 822d66 96889 7b50f5 40 API calls __fread_nolock 96756->96889 96758 822d81 96890 7b50f5 40 API calls __fread_nolock 96758->96890 96760 822d9c 96891 7b511f 64 API calls 96760->96891 96762 822db3 96763 7dea0c ___std_exception_copy 21 API calls 96762->96763 96764 822dba 96763->96764 96765 7dea0c ___std_exception_copy 21 API calls 96764->96765 96766 822dc4 96765->96766 96892 7b50f5 40 API calls __fread_nolock 96766->96892 96768 822dd8 96893 8228fe 27 API calls 96768->96893 96770->96627 96771 822dee 96771->96770 96894 8222ce 96771->96894 96774 7b4f43 96773->96774 96775 7b4f4a 96773->96775 96776 7de678 67 API calls 96774->96776 96777 7b4f6a FreeLibrary 96775->96777 96778 7b4f59 96775->96778 96776->96775 96777->96778 96778->96629 96779->96642 96780->96646 96781->96652 96782->96656 96783->96661 96784->96667 96785->96670 96787 7baec9 22 API calls 96786->96787 96788 7b4c78 96787->96788 96788->96696 96790 7b4ea8 GetProcAddress 96789->96790 96791 7b4ec6 96789->96791 96792 7b4eb8 96790->96792 96794 7de5eb 96791->96794 96792->96791 96793 7b4ebf FreeLibrary 96792->96793 96793->96791 96821 7de52a 96794->96821 96796 7b4eea 96796->96712 96796->96713 96798 7b4e6e GetProcAddress 96797->96798 96799 7b4e8d 96797->96799 96800 7b4e7e 96798->96800 96802 7b4f80 96799->96802 96800->96799 96801 7b4e86 FreeLibrary 96800->96801 96801->96799 96803 7cfe0b 22 API calls 96802->96803 96804 7b4f95 96803->96804 96805 7b5722 22 API calls 96804->96805 96806 7b4fa1 __fread_nolock 96805->96806 96807 7f3d1d 96806->96807 96808 7b50a5 96806->96808 96818 7b4fdc 96806->96818 96882 82304d 74 API calls 96807->96882 96874 7b42a2 CreateStreamOnHGlobal 96808->96874 96811 7f3d22 96883 7b511f 64 API calls 96811->96883 96814 7f3d45 96884 7b50f5 40 API calls __fread_nolock 96814->96884 96816 7b506e ISource 96816->96721 96818->96811 96818->96816 96880 7b50f5 40 API calls __fread_nolock 96818->96880 96881 7b511f 64 API calls 96818->96881 96819->96725 96820->96728 96824 7de536 ___DestructExceptionObject 96821->96824 96822 7de544 96846 7df2d9 20 API calls _abort 96822->96846 96824->96822 96826 7de574 96824->96826 96825 7de549 96847 7e27ec 26 API calls __wsopen_s 96825->96847 96828 7de579 96826->96828 96829 7de586 96826->96829 96848 7df2d9 20 API calls _abort 96828->96848 96838 7e8061 96829->96838 96832 7de58f 96833 7de595 96832->96833 96834 7de5a2 96832->96834 96849 7df2d9 20 API calls _abort 96833->96849 96850 7de5d4 LeaveCriticalSection __fread_nolock 96834->96850 96836 7de554 __wsopen_s 96836->96796 96839 7e806d ___DestructExceptionObject 96838->96839 96851 7e2f5e EnterCriticalSection 96839->96851 96841 7e807b 96852 7e80fb 96841->96852 96845 7e80ac __wsopen_s 96845->96832 96846->96825 96847->96836 96848->96836 96849->96836 96850->96836 96851->96841 96858 7e811e 96852->96858 96853 7e8177 96854 7e4c7d _abort 20 API calls 96853->96854 96855 7e8180 96854->96855 96870 7e29c8 20 API calls __dosmaperr 96855->96870 96858->96853 96861 7e8088 96858->96861 96868 7d918d EnterCriticalSection 96858->96868 96869 7d91a1 LeaveCriticalSection 96858->96869 96859 7e8189 96859->96861 96871 7e3405 11 API calls 2 library calls 96859->96871 96865 7e80b7 96861->96865 96862 7e81a8 96872 7d918d EnterCriticalSection 96862->96872 96873 7e2fa6 LeaveCriticalSection 96865->96873 96867 7e80be 96867->96845 96868->96858 96869->96858 96870->96859 96871->96862 96872->96861 96873->96867 96875 7b42d9 96874->96875 96876 7b42bc FindResourceExW 96874->96876 96875->96818 96876->96875 96877 7f35ba LoadResource 96876->96877 96877->96875 96878 7f35cf SizeofResource 96877->96878 96878->96875 96879 7f35e3 LockResource 96878->96879 96879->96875 96880->96818 96881->96818 96882->96811 96883->96814 96884->96816 96885->96750 96886->96752 96887->96754 96888->96756 96889->96758 96890->96760 96891->96762 96892->96768 96893->96771 96895 8222e7 96894->96895 96896 8222d9 96894->96896 96898 82232c 96895->96898 96899 7de5eb 29 API calls 96895->96899 96918 8222f0 96895->96918 96897 7de5eb 29 API calls 96896->96897 96897->96895 96923 822557 40 API calls __fread_nolock 96898->96923 96901 822311 96899->96901 96901->96898 96903 82231a 96901->96903 96902 822370 96904 822374 96902->96904 96905 822395 96902->96905 96903->96918 96931 7de678 96903->96931 96908 822381 96904->96908 96910 7de678 67 API calls 96904->96910 96924 822171 96905->96924 96913 7de678 67 API calls 96908->96913 96908->96918 96909 82239d 96911 8223c3 96909->96911 96912 8223a3 96909->96912 96910->96908 96944 8223f3 74 API calls 96911->96944 96914 8223b0 96912->96914 96916 7de678 67 API calls 96912->96916 96913->96918 96917 7de678 67 API calls 96914->96917 96914->96918 96916->96914 96917->96918 96918->96770 96919 8223ca 96920 8223de 96919->96920 96921 7de678 67 API calls 96919->96921 96920->96918 96922 7de678 67 API calls 96920->96922 96921->96920 96922->96918 96923->96902 96925 7dea0c ___std_exception_copy 21 API calls 96924->96925 96926 82217f 96925->96926 96927 7dea0c ___std_exception_copy 21 API calls 96926->96927 96928 822190 96927->96928 96929 7dea0c ___std_exception_copy 21 API calls 96928->96929 96930 82219c 96929->96930 96930->96909 96932 7de684 ___DestructExceptionObject 96931->96932 96933 7de6aa 96932->96933 96934 7de695 96932->96934 96943 7de6a5 __wsopen_s 96933->96943 96945 7d918d EnterCriticalSection 96933->96945 96962 7df2d9 20 API calls _abort 96934->96962 96936 7de69a 96963 7e27ec 26 API calls __wsopen_s 96936->96963 96939 7de6c6 96946 7de602 96939->96946 96941 7de6d1 96964 7de6ee LeaveCriticalSection __fread_nolock 96941->96964 96943->96918 96944->96919 96945->96939 96947 7de60f 96946->96947 96948 7de624 96946->96948 96997 7df2d9 20 API calls _abort 96947->96997 96953 7de61f 96948->96953 96965 7ddc0b 96948->96965 96950 7de614 96998 7e27ec 26 API calls __wsopen_s 96950->96998 96953->96941 96958 7de646 96982 7e862f 96958->96982 96962->96936 96963->96943 96964->96943 96966 7ddc23 96965->96966 96970 7ddc1f 96965->96970 96967 7dd955 __fread_nolock 26 API calls 96966->96967 96966->96970 96968 7ddc43 96967->96968 97000 7e59be 62 API calls 3 library calls 96968->97000 96971 7e4d7a 96970->96971 96972 7e4d90 96971->96972 96974 7de640 96971->96974 96972->96974 97001 7e29c8 20 API calls __dosmaperr 96972->97001 96975 7dd955 96974->96975 96976 7dd976 96975->96976 96977 7dd961 96975->96977 96976->96958 97002 7df2d9 20 API calls _abort 96977->97002 96979 7dd966 97003 7e27ec 26 API calls __wsopen_s 96979->97003 96981 7dd971 96981->96958 96983 7e863e 96982->96983 96984 7e8653 96982->96984 97007 7df2c6 20 API calls _abort 96983->97007 96985 7e868e 96984->96985 96990 7e867a 96984->96990 97009 7df2c6 20 API calls _abort 96985->97009 96987 7e8643 97008 7df2d9 20 API calls _abort 96987->97008 97004 7e8607 96990->97004 96991 7e8693 97010 7df2d9 20 API calls _abort 96991->97010 96994 7de64c 96994->96953 96999 7e29c8 20 API calls __dosmaperr 96994->96999 96995 7e869b 97011 7e27ec 26 API calls __wsopen_s 96995->97011 96997->96950 96998->96953 96999->96953 97000->96970 97001->96974 97002->96979 97003->96981 97012 7e8585 97004->97012 97006 7e862b 97006->96994 97007->96987 97008->96994 97009->96991 97010->96995 97011->96994 97013 7e8591 ___DestructExceptionObject 97012->97013 97023 7e5147 EnterCriticalSection 97013->97023 97015 7e859f 97016 7e85c6 97015->97016 97017 7e85d1 97015->97017 97024 7e86ae 97016->97024 97039 7df2d9 20 API calls _abort 97017->97039 97020 7e85cc 97040 7e85fb LeaveCriticalSection __wsopen_s 97020->97040 97022 7e85ee __wsopen_s 97022->97006 97023->97015 97041 7e53c4 97024->97041 97026 7e86c4 97054 7e5333 21 API calls 2 library calls 97026->97054 97028 7e86be 97028->97026 97030 7e53c4 __wsopen_s 26 API calls 97028->97030 97038 7e86f6 97028->97038 97029 7e871c 97032 7e873e 97029->97032 97055 7df2a3 20 API calls __dosmaperr 97029->97055 97033 7e86ed 97030->97033 97031 7e53c4 __wsopen_s 26 API calls 97034 7e8702 CloseHandle 97031->97034 97032->97020 97037 7e53c4 __wsopen_s 26 API calls 97033->97037 97034->97026 97035 7e870e GetLastError 97034->97035 97035->97026 97037->97038 97038->97026 97038->97031 97039->97020 97040->97022 97042 7e53e6 97041->97042 97043 7e53d1 97041->97043 97049 7e540b 97042->97049 97058 7df2c6 20 API calls _abort 97042->97058 97056 7df2c6 20 API calls _abort 97043->97056 97046 7e53d6 97057 7df2d9 20 API calls _abort 97046->97057 97047 7e5416 97059 7df2d9 20 API calls _abort 97047->97059 97049->97028 97051 7e541e 97060 7e27ec 26 API calls __wsopen_s 97051->97060 97052 7e53de 97052->97028 97054->97029 97055->97032 97056->97046 97057->97052 97058->97047 97059->97051 97060->97052 97061 7b3156 97064 7b3170 97061->97064 97065 7b3187 97064->97065 97066 7b31eb 97065->97066 97067 7b318c 97065->97067 97068 7b31e9 97065->97068 97072 7f2dfb 97066->97072 97073 7b31f1 97066->97073 97069 7b3199 97067->97069 97070 7b3265 PostQuitMessage 97067->97070 97071 7b31d0 DefWindowProcW 97068->97071 97077 7f2e7c 97069->97077 97078 7b31a4 97069->97078 97079 7b316a 97070->97079 97071->97079 97123 7b18e2 10 API calls 97072->97123 97074 7b31f8 97073->97074 97075 7b321d SetTimer RegisterWindowMessageW 97073->97075 97080 7f2d9c 97074->97080 97081 7b3201 KillTimer 97074->97081 97075->97079 97083 7b3246 CreatePopupMenu 97075->97083 97136 81bf30 34 API calls ___scrt_fastfail 97077->97136 97084 7b31ae 97078->97084 97085 7f2e68 97078->97085 97093 7f2dd7 MoveWindow 97080->97093 97094 7f2da1 97080->97094 97109 7b30f2 97081->97109 97082 7f2e1c 97124 7ce499 42 API calls 97082->97124 97083->97079 97090 7f2e4d 97084->97090 97091 7b31b9 97084->97091 97113 81c161 97085->97113 97090->97071 97135 810ad7 22 API calls 97090->97135 97096 7b31c4 97091->97096 97097 7b3253 97091->97097 97092 7f2e8e 97092->97071 97092->97079 97093->97079 97098 7f2da7 97094->97098 97099 7f2dc6 SetFocus 97094->97099 97096->97071 97106 7b30f2 Shell_NotifyIconW 97096->97106 97121 7b326f 44 API calls ___scrt_fastfail 97097->97121 97098->97096 97103 7f2db0 97098->97103 97099->97079 97122 7b18e2 10 API calls 97103->97122 97105 7b3263 97105->97079 97107 7f2e41 97106->97107 97125 7b3837 97107->97125 97110 7b3154 97109->97110 97111 7b3104 ___scrt_fastfail 97109->97111 97120 7b3c50 DeleteObject DestroyWindow 97110->97120 97112 7b3123 Shell_NotifyIconW 97111->97112 97112->97110 97114 81c276 97113->97114 97115 81c179 ___scrt_fastfail 97113->97115 97114->97079 97137 7b3923 97115->97137 97117 81c25f KillTimer SetTimer 97117->97114 97118 81c1a0 97118->97117 97119 81c251 Shell_NotifyIconW 97118->97119 97119->97117 97120->97079 97121->97105 97122->97079 97123->97082 97124->97096 97126 7b3862 ___scrt_fastfail 97125->97126 97167 7b4212 97126->97167 97129 7b38e8 97131 7f3386 Shell_NotifyIconW 97129->97131 97132 7b3906 Shell_NotifyIconW 97129->97132 97133 7b3923 24 API calls 97132->97133 97134 7b391c 97133->97134 97134->97068 97135->97068 97136->97092 97138 7b393f 97137->97138 97139 7b3a13 97137->97139 97159 7b6270 97138->97159 97139->97118 97142 7b395a 97144 7b6b57 22 API calls 97142->97144 97143 7f3393 LoadStringW 97145 7f33ad 97143->97145 97146 7b396f 97144->97146 97153 7b3994 ___scrt_fastfail 97145->97153 97165 7ba8c7 22 API calls __fread_nolock 97145->97165 97147 7f33c9 97146->97147 97148 7b397c 97146->97148 97166 7b6350 22 API calls 97147->97166 97148->97145 97149 7b3986 97148->97149 97164 7b6350 22 API calls 97149->97164 97156 7b39f9 Shell_NotifyIconW 97153->97156 97154 7f33d7 97154->97153 97155 7b33c6 22 API calls 97154->97155 97157 7f33f9 97155->97157 97156->97139 97158 7b33c6 22 API calls 97157->97158 97158->97153 97160 7cfe0b 22 API calls 97159->97160 97161 7b6295 97160->97161 97162 7cfddb 22 API calls 97161->97162 97163 7b394d 97162->97163 97163->97142 97163->97143 97164->97153 97165->97153 97166->97154 97168 7f35a4 97167->97168 97169 7b38b7 97167->97169 97168->97169 97170 7f35ad DestroyIcon 97168->97170 97169->97129 97171 81c874 42 API calls _strftime 97169->97171 97170->97169 97171->97129 97172 803f75 97183 7cceb1 97172->97183 97174 803f8b 97175 804006 97174->97175 97192 7ce300 23 API calls 97174->97192 97178 7bbf40 348 API calls 97175->97178 97177 803fe6 97180 804052 97177->97180 97193 821abf 22 API calls 97177->97193 97178->97180 97181 804a88 97180->97181 97194 82359c 82 API calls __wsopen_s 97180->97194 97184 7ccebf 97183->97184 97185 7cced2 97183->97185 97195 7baceb 23 API calls ISource 97184->97195 97186 7ccf05 97185->97186 97187 7cced7 97185->97187 97196 7baceb 23 API calls ISource 97186->97196 97189 7cfddb 22 API calls 97187->97189 97191 7ccec9 97189->97191 97191->97174 97192->97177 97193->97175 97194->97181 97195->97191 97196->97191 97197 7b1cad SystemParametersInfoW 97198 7b2de3 97199 7b2df0 __wsopen_s 97198->97199 97200 7b2e09 97199->97200 97201 7f2c2b ___scrt_fastfail 97199->97201 97202 7b3aa2 23 API calls 97200->97202 97204 7f2c47 GetOpenFileNameW 97201->97204 97203 7b2e12 97202->97203 97214 7b2da5 97203->97214 97206 7f2c96 97204->97206 97207 7b6b57 22 API calls 97206->97207 97209 7f2cab 97207->97209 97209->97209 97211 7b2e27 97232 7b44a8 97211->97232 97215 7f1f50 __wsopen_s 97214->97215 97216 7b2db2 GetLongPathNameW 97215->97216 97217 7b6b57 22 API calls 97216->97217 97218 7b2dda 97217->97218 97219 7b3598 97218->97219 97220 7ba961 22 API calls 97219->97220 97221 7b35aa 97220->97221 97222 7b3aa2 23 API calls 97221->97222 97223 7b35b5 97222->97223 97224 7f32eb 97223->97224 97225 7b35c0 97223->97225 97230 7f330d 97224->97230 97267 7cce60 41 API calls 97224->97267 97226 7b515f 22 API calls 97225->97226 97228 7b35cc 97226->97228 97261 7b35f3 97228->97261 97231 7b35df 97231->97211 97233 7b4ecb 94 API calls 97232->97233 97234 7b44cd 97233->97234 97235 7f3833 97234->97235 97237 7b4ecb 94 API calls 97234->97237 97236 822cf9 80 API calls 97235->97236 97238 7f3848 97236->97238 97239 7b44e1 97237->97239 97241 7f384c 97238->97241 97242 7f3869 97238->97242 97239->97235 97240 7b44e9 97239->97240 97243 7f3854 97240->97243 97244 7b44f5 97240->97244 97245 7b4f39 68 API calls 97241->97245 97246 7cfe0b 22 API calls 97242->97246 97269 81da5a 82 API calls 97243->97269 97268 7b940c 136 API calls 2 library calls 97244->97268 97245->97243 97254 7f38ae 97246->97254 97249 7b2e31 97250 7f3862 97250->97242 97251 7b4f39 68 API calls 97252 7f3a5f 97251->97252 97252->97251 97275 81989b 82 API calls __wsopen_s 97252->97275 97254->97252 97258 7b9cb3 22 API calls 97254->97258 97270 81967e 22 API calls __fread_nolock 97254->97270 97271 8195ad 42 API calls _wcslen 97254->97271 97272 820b5a 22 API calls 97254->97272 97273 7ba4a1 22 API calls __fread_nolock 97254->97273 97274 7b3ff7 22 API calls 97254->97274 97258->97254 97262 7b3605 97261->97262 97266 7b3624 __fread_nolock 97261->97266 97265 7cfe0b 22 API calls 97262->97265 97263 7cfddb 22 API calls 97264 7b363b 97263->97264 97264->97231 97265->97266 97266->97263 97267->97224 97268->97249 97269->97250 97270->97254 97271->97254 97272->97254 97273->97254 97274->97254 97275->97252 97276 7f2ba5 97277 7f2baf 97276->97277 97278 7b2b25 97276->97278 97280 7b3a5a 24 API calls 97277->97280 97304 7b2b83 7 API calls 97278->97304 97282 7f2bb8 97280->97282 97284 7b9cb3 22 API calls 97282->97284 97286 7f2bc6 97284->97286 97285 7b2b2f 97290 7b3837 49 API calls 97285->97290 97295 7b2b44 97285->97295 97287 7f2bce 97286->97287 97288 7f2bf5 97286->97288 97289 7b33c6 22 API calls 97287->97289 97291 7b33c6 22 API calls 97288->97291 97292 7f2bd9 97289->97292 97290->97295 97293 7f2bf1 GetForegroundWindow ShellExecuteW 97291->97293 97308 7b6350 22 API calls 97292->97308 97298 7f2c26 97293->97298 97296 7b2b5f 97295->97296 97299 7b30f2 Shell_NotifyIconW 97295->97299 97301 7b2b66 SetCurrentDirectoryW 97296->97301 97298->97296 97299->97296 97300 7f2be7 97302 7b33c6 22 API calls 97300->97302 97303 7b2b7a 97301->97303 97302->97293 97309 7b2cd4 7 API calls 97304->97309 97306 7b2b2a 97307 7b2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97306->97307 97307->97285 97308->97300 97309->97306 97310 7e8402 97315 7e81be 97310->97315 97313 7e842a 97316 7e81ef try_get_first_available_module 97315->97316 97326 7e8338 97316->97326 97330 7d8e0b 40 API calls 2 library calls 97316->97330 97318 7e83ee 97334 7e27ec 26 API calls __wsopen_s 97318->97334 97320 7e8343 97320->97313 97327 7f0984 97320->97327 97322 7e838c 97322->97326 97331 7d8e0b 40 API calls 2 library calls 97322->97331 97324 7e83ab 97324->97326 97332 7d8e0b 40 API calls 2 library calls 97324->97332 97326->97320 97333 7df2d9 20 API calls _abort 97326->97333 97335 7f0081 97327->97335 97329 7f099f 97329->97313 97330->97322 97331->97324 97332->97326 97333->97318 97334->97320 97337 7f008d ___DestructExceptionObject 97335->97337 97336 7f009b 97393 7df2d9 20 API calls _abort 97336->97393 97337->97336 97339 7f00d4 97337->97339 97346 7f065b 97339->97346 97340 7f00a0 97394 7e27ec 26 API calls __wsopen_s 97340->97394 97345 7f00aa __wsopen_s 97345->97329 97396 7f042f 97346->97396 97349 7f068d 97428 7df2c6 20 API calls _abort 97349->97428 97350 7f06a6 97414 7e5221 97350->97414 97353 7f06ab 97354 7f06cb 97353->97354 97355 7f06b4 97353->97355 97427 7f039a CreateFileW 97354->97427 97430 7df2c6 20 API calls _abort 97355->97430 97359 7f06b9 97431 7df2d9 20 API calls _abort 97359->97431 97361 7f0781 GetFileType 97362 7f078c GetLastError 97361->97362 97363 7f07d3 97361->97363 97434 7df2a3 20 API calls __dosmaperr 97362->97434 97436 7e516a 21 API calls 2 library calls 97363->97436 97364 7f0692 97429 7df2d9 20 API calls _abort 97364->97429 97365 7f0756 GetLastError 97433 7df2a3 20 API calls __dosmaperr 97365->97433 97366 7f0704 97366->97361 97366->97365 97432 7f039a CreateFileW 97366->97432 97369 7f079a CloseHandle 97369->97364 97371 7f07c3 97369->97371 97435 7df2d9 20 API calls _abort 97371->97435 97373 7f0749 97373->97361 97373->97365 97375 7f07f4 97376 7f0840 97375->97376 97437 7f05ab 72 API calls 3 library calls 97375->97437 97381 7f086d 97376->97381 97438 7f014d 72 API calls 4 library calls 97376->97438 97377 7f07c8 97377->97364 97380 7f0866 97380->97381 97382 7f087e 97380->97382 97383 7e86ae __wsopen_s 29 API calls 97381->97383 97384 7f00f8 97382->97384 97385 7f08fc CloseHandle 97382->97385 97383->97384 97395 7f0121 LeaveCriticalSection __wsopen_s 97384->97395 97439 7f039a CreateFileW 97385->97439 97387 7f0927 97388 7f095d 97387->97388 97389 7f0931 GetLastError 97387->97389 97388->97384 97440 7df2a3 20 API calls __dosmaperr 97389->97440 97391 7f093d 97441 7e5333 21 API calls 2 library calls 97391->97441 97393->97340 97394->97345 97395->97345 97397 7f0450 97396->97397 97402 7f046a 97396->97402 97397->97402 97449 7df2d9 20 API calls _abort 97397->97449 97400 7f045f 97450 7e27ec 26 API calls __wsopen_s 97400->97450 97442 7f03bf 97402->97442 97403 7f04d1 97412 7f0524 97403->97412 97453 7dd70d 26 API calls 2 library calls 97403->97453 97404 7f04a2 97404->97403 97451 7df2d9 20 API calls _abort 97404->97451 97407 7f051f 97409 7f059e 97407->97409 97407->97412 97408 7f04c6 97452 7e27ec 26 API calls __wsopen_s 97408->97452 97454 7e27fc 11 API calls _abort 97409->97454 97412->97349 97412->97350 97413 7f05aa 97415 7e522d ___DestructExceptionObject 97414->97415 97457 7e2f5e EnterCriticalSection 97415->97457 97417 7e527b 97458 7e532a 97417->97458 97418 7e5234 97418->97417 97419 7e5259 97418->97419 97424 7e52c7 EnterCriticalSection 97418->97424 97421 7e5000 __wsopen_s 21 API calls 97419->97421 97423 7e525e 97421->97423 97422 7e52a4 __wsopen_s 97422->97353 97423->97417 97461 7e5147 EnterCriticalSection 97423->97461 97424->97417 97425 7e52d4 LeaveCriticalSection 97424->97425 97425->97418 97427->97366 97428->97364 97429->97384 97430->97359 97431->97364 97432->97373 97433->97364 97434->97369 97435->97377 97436->97375 97437->97376 97438->97380 97439->97387 97440->97391 97441->97388 97444 7f03d7 97442->97444 97443 7f03f2 97443->97404 97444->97443 97455 7df2d9 20 API calls _abort 97444->97455 97446 7f0416 97456 7e27ec 26 API calls __wsopen_s 97446->97456 97448 7f0421 97448->97404 97449->97400 97450->97402 97451->97408 97452->97403 97453->97407 97454->97413 97455->97446 97456->97448 97457->97418 97462 7e2fa6 LeaveCriticalSection 97458->97462 97460 7e5331 97460->97422 97461->97417 97462->97460 97463 7f2402 97466 7b1410 97463->97466 97467 7b144f mciSendStringW 97466->97467 97468 7f24b8 DestroyWindow 97466->97468 97469 7b146b 97467->97469 97470 7b16c6 97467->97470 97481 7f24c4 97468->97481 97471 7b1479 97469->97471 97469->97481 97470->97469 97472 7b16d5 UnregisterHotKey 97470->97472 97499 7b182e 97471->97499 97472->97470 97474 7f24d8 97474->97481 97505 7b6246 CloseHandle 97474->97505 97475 7f24e2 FindClose 97475->97481 97477 7f2509 97480 7f251c FreeLibrary 97477->97480 97482 7f252d 97477->97482 97479 7b148e 97479->97482 97487 7b149c 97479->97487 97480->97477 97481->97474 97481->97475 97481->97477 97483 7f2541 VirtualFree 97482->97483 97490 7b1509 97482->97490 97483->97482 97484 7b14f8 CoUninitialize 97484->97490 97485 7f2589 97492 7f2598 ISource 97485->97492 97506 8232eb 6 API calls ISource 97485->97506 97486 7b1514 97489 7b1524 97486->97489 97487->97484 97503 7b1944 VirtualFreeEx CloseHandle 97489->97503 97490->97485 97490->97486 97495 7f2627 97492->97495 97507 8164d4 22 API calls ISource 97492->97507 97494 7b153a 97494->97492 97496 7b161f 97494->97496 97495->97495 97496->97495 97504 7b1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 97496->97504 97498 7b16c1 97500 7b183b 97499->97500 97501 7b1480 97500->97501 97508 81702a 22 API calls 97500->97508 97501->97477 97501->97479 97503->97494 97504->97498 97505->97474 97506->97485 97507->97492 97508->97500 97509 7b1044 97514 7b10f3 97509->97514 97511 7b104a 97550 7d00a3 29 API calls __onexit 97511->97550 97513 7b1054 97551 7b1398 97514->97551 97518 7b116a 97519 7ba961 22 API calls 97518->97519 97520 7b1174 97519->97520 97521 7ba961 22 API calls 97520->97521 97522 7b117e 97521->97522 97523 7ba961 22 API calls 97522->97523 97524 7b1188 97523->97524 97525 7ba961 22 API calls 97524->97525 97526 7b11c6 97525->97526 97527 7ba961 22 API calls 97526->97527 97528 7b1292 97527->97528 97561 7b171c 97528->97561 97532 7b12c4 97533 7ba961 22 API calls 97532->97533 97534 7b12ce 97533->97534 97535 7c1940 9 API calls 97534->97535 97536 7b12f9 97535->97536 97582 7b1aab 97536->97582 97538 7b1315 97539 7b1325 GetStdHandle 97538->97539 97540 7f2485 97539->97540 97541 7b137a 97539->97541 97540->97541 97542 7f248e 97540->97542 97544 7b1387 OleInitialize 97541->97544 97543 7cfddb 22 API calls 97542->97543 97545 7f2495 97543->97545 97544->97511 97589 82011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97545->97589 97547 7f249e 97590 820944 CreateThread 97547->97590 97549 7f24aa CloseHandle 97549->97541 97550->97513 97591 7b13f1 97551->97591 97554 7b13f1 22 API calls 97555 7b13d0 97554->97555 97556 7ba961 22 API calls 97555->97556 97557 7b13dc 97556->97557 97558 7b6b57 22 API calls 97557->97558 97559 7b1129 97558->97559 97560 7b1bc3 6 API calls 97559->97560 97560->97518 97562 7ba961 22 API calls 97561->97562 97563 7b172c 97562->97563 97564 7ba961 22 API calls 97563->97564 97565 7b1734 97564->97565 97566 7ba961 22 API calls 97565->97566 97567 7b174f 97566->97567 97568 7cfddb 22 API calls 97567->97568 97569 7b129c 97568->97569 97570 7b1b4a 97569->97570 97571 7b1b58 97570->97571 97572 7ba961 22 API calls 97571->97572 97573 7b1b63 97572->97573 97574 7ba961 22 API calls 97573->97574 97575 7b1b6e 97574->97575 97576 7ba961 22 API calls 97575->97576 97577 7b1b79 97576->97577 97578 7ba961 22 API calls 97577->97578 97579 7b1b84 97578->97579 97580 7cfddb 22 API calls 97579->97580 97581 7b1b96 RegisterWindowMessageW 97580->97581 97581->97532 97583 7b1abb 97582->97583 97584 7f272d 97582->97584 97585 7cfddb 22 API calls 97583->97585 97598 823209 23 API calls 97584->97598 97587 7b1ac3 97585->97587 97587->97538 97588 7f2738 97589->97547 97590->97549 97599 82092a 28 API calls 97590->97599 97592 7ba961 22 API calls 97591->97592 97593 7b13fc 97592->97593 97594 7ba961 22 API calls 97593->97594 97595 7b1404 97594->97595 97596 7ba961 22 API calls 97595->97596 97597 7b13c6 97596->97597 97597->97554 97598->97588

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                                                                                                        control_flow_graph 394 7b42de-7b434d call 7ba961 GetVersionExW call 7b6b57 399 7f3617-7f362a 394->399 400 7b4353 394->400 401 7f362b-7f362f 399->401 402 7b4355-7b4357 400->402 403 7f3632-7f363e 401->403 404 7f3631 401->404 405 7b435d-7b43bc call 7b93b2 call 7b37a0 402->405 406 7f3656 402->406 403->401 407 7f3640-7f3642 403->407 404->403 423 7f37df-7f37e6 405->423 424 7b43c2-7b43c4 405->424 410 7f365d-7f3660 406->410 407->402 409 7f3648-7f364f 407->409 409->399 412 7f3651 409->412 413 7b441b-7b4435 GetCurrentProcess IsWow64Process 410->413 414 7f3666-7f36a8 410->414 412->406 416 7b4437 413->416 417 7b4494-7b449a 413->417 414->413 418 7f36ae-7f36b1 414->418 420 7b443d-7b4449 416->420 417->420 421 7f36db-7f36e5 418->421 422 7f36b3-7f36bd 418->422 430 7b444f-7b445e LoadLibraryA 420->430 431 7f3824-7f3828 GetSystemInfo 420->431 426 7f36f8-7f3702 421->426 427 7f36e7-7f36f3 421->427 432 7f36bf-7f36c5 422->432 433 7f36ca-7f36d6 422->433 428 7f37e8 423->428 429 7f3806-7f3809 423->429 424->410 425 7b43ca-7b43dd 424->425 434 7b43e3-7b43e5 425->434 435 7f3726-7f372f 425->435 437 7f3715-7f3721 426->437 438 7f3704-7f3710 426->438 427->413 436 7f37ee 428->436 439 7f380b-7f381a 429->439 440 7f37f4-7f37fc 429->440 441 7b449c-7b44a6 GetSystemInfo 430->441 442 7b4460-7b446e GetProcAddress 430->442 432->413 433->413 444 7b43eb-7b43ee 434->444 445 7f374d-7f3762 434->445 446 7f373c-7f3748 435->446 447 7f3731-7f3737 435->447 436->440 437->413 438->413 439->436 448 7f381c-7f3822 439->448 440->429 443 7b4476-7b4478 441->443 442->441 449 7b4470-7b4474 GetNativeSystemInfo 442->449 454 7b447a-7b447b FreeLibrary 443->454 455 7b4481-7b4493 443->455 450 7f3791-7f3794 444->450 451 7b43f4-7b440f 444->451 452 7f376f-7f377b 445->452 453 7f3764-7f376a 445->453 446->413 447->413 448->440 449->443 450->413 458 7f379a-7f37c1 450->458 456 7b4415 451->456 457 7f3780-7f378c 451->457 452->413 453->413 454->455 456->413 457->413 459 7f37ce-7f37da 458->459 460 7f37c3-7f37c9 458->460 459->413 460->413
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetVersionExW.KERNEL32(?), ref: 007B430D
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentProcess.KERNEL32(?,0084CB64,00000000,?,?), ref: 007B4422
                                                                                                                                                                                                                                                                                                                                                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 007B4429
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 007B4454
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 007B4466
                                                                                                                                                                                                                                                                                                                                                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 007B4474
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 007B447B
                                                                                                                                                                                                                                                                                                                                                        • GetSystemInfo.KERNEL32(?,?,?), ref: 007B44A0
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 31c10f58583c204bf89f278d7d2773f985706a9e11b57451ca549c14679100e9
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 61ec2583f1aaf40ba2d2d5b8f74cc5127ade140d97c6b80256baa2f274d974ae
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 31c10f58583c204bf89f278d7d2773f985706a9e11b57451ca549c14679100e9
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A7A1737690A2C4DFCF12D76D7C8D6E67FAC7B26740B184899D18193B23DE6C460ACB21

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                                                                                                        control_flow_graph 798 7b42a2-7b42ba CreateStreamOnHGlobal 799 7b42da-7b42dd 798->799 800 7b42bc-7b42d3 FindResourceExW 798->800 801 7b42d9 800->801 802 7f35ba-7f35c9 LoadResource 800->802 801->799 802->801 803 7f35cf-7f35dd SizeofResource 802->803 803->801 804 7f35e3-7f35ee LockResource 803->804 804->801 805 7f35f4-7f3612 804->805 805->801
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,007B50AA,?,?,00000000,00000000), ref: 007B42B2
                                                                                                                                                                                                                                                                                                                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007B50AA,?,?,00000000,00000000), ref: 007B42C9
                                                                                                                                                                                                                                                                                                                                                        • LoadResource.KERNEL32(?,00000000,?,?,007B50AA,?,?,00000000,00000000,?,?,?,?,?,?,007B4F20), ref: 007F35BE
                                                                                                                                                                                                                                                                                                                                                        • SizeofResource.KERNEL32(?,00000000,?,?,007B50AA,?,?,00000000,00000000,?,?,?,?,?,?,007B4F20), ref: 007F35D3
                                                                                                                                                                                                                                                                                                                                                        • LockResource.KERNEL32(007B50AA,?,?,007B50AA,?,?,00000000,00000000,?,?,?,?,?,?,007B4F20,?), ref: 007F35E6
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                                                                                                                                                        • String ID: SCRIPT
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: cf4bbba20324b258387833fd08b62981aea744ae5bb7e1d5baaf0f0c933de58b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 9dc274f03fe5e6c1ad48d25770722103672931bd6b9fee83b357adfcf5360853
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: cf4bbba20324b258387833fd08b62981aea744ae5bb7e1d5baaf0f0c933de58b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 41117C75201700BFEB218FA5DC49FA77BBDFBC6B51F104169B412D6260DBB1D800D620

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 007B2B6B
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00881418,?,007B2E7F,?,?,?,00000000), ref: 007B3A78
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00872224), ref: 007F2C10
                                                                                                                                                                                                                                                                                                                                                        • ShellExecuteW.SHELL32(00000000,?,?,00872224), ref: 007F2C17
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: runas
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 448630720-4000483414
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2694e82f5ba4045dbc9d9f64798f5717c707d6bab01aa909cc4224f7c2f580bd
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 7ac80b73e449079be8b94949505e84ee727149f2b9ca01b8cbae699e9eb4802c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2694e82f5ba4045dbc9d9f64798f5717c707d6bab01aa909cc4224f7c2f580bd
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1611D571209305EAC704FF60D859BEEBBA9AB91700F44042DF256431A3DF2C898AC712

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0081D501
                                                                                                                                                                                                                                                                                                                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0081D50F
                                                                                                                                                                                                                                                                                                                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0081D52F
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNELBASE(00000000), ref: 0081D5DC
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 420147892-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a1ccf2014cc592bab459987a593b026a3ea143ba6fd07ef37e8f8eeb29746ffd
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3aeea90104eb74051dd1f5db9c70921e7c62b55fc94638c7c2f57f4c9a66b9a1
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a1ccf2014cc592bab459987a593b026a3ea143ba6fd07ef37e8f8eeb29746ffd
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B1314D711083009FD301EF54C889BEABBE9FF99354F14092DF685861A1EB719985CB92

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                                                                                                        control_flow_graph 998 81dbbe-81dbda lstrlenW 999 81dc06 998->999 1000 81dbdc-81dbe6 GetFileAttributesW 998->1000 1001 81dc09-81dc0d 999->1001 1000->1001 1002 81dbe8-81dbf7 FindFirstFileW 1000->1002 1002->999 1003 81dbf9-81dc04 FindClose 1002->1003 1003->1001
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • lstrlenW.KERNEL32(?,007F5222), ref: 0081DBCE
                                                                                                                                                                                                                                                                                                                                                        • GetFileAttributesW.KERNELBASE(?), ref: 0081DBDD
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0081DBEE
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0081DBFA
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2695905019-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 3d48c97496f11d05d3582c45ee4bc749237b0d9ad5c021e5b7f5f790f585a59f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 36c2b104dfb7976c156c182724837bb5210a72e3bfd13ab95c398a7b0f847fa2
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3d48c97496f11d05d3582c45ee4bc749237b0d9ad5c021e5b7f5f790f585a59f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BAF0A038811A245782206B78AC0D9EA376CFF02334B104B02F936C22E0FBF05994C6D5
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentProcess.KERNEL32(007E28E9,?,007D4CBE,007E28E9,008788B8,0000000C,007D4E15,007E28E9,00000002,00000000,?,007E28E9), ref: 007D4D09
                                                                                                                                                                                                                                                                                                                                                        • TerminateProcess.KERNEL32(00000000,?,007D4CBE,007E28E9,008788B8,0000000C,007D4E15,007E28E9,00000002,00000000,?,007E28E9), ref: 007D4D10
                                                                                                                                                                                                                                                                                                                                                        • ExitProcess.KERNEL32 ref: 007D4D22
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1703294689-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: dce429a0df2e16f58f25ba3119464e8b76d42070d0f0f1a3e67919aedbaa87bb
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a2c2ab1ec915e69465f933999e2f24e945c0cb0d0ed57f2f6f8fe7142d9bc3c6
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: dce429a0df2e16f58f25ba3119464e8b76d42070d0f0f1a3e67919aedbaa87bb
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8CE0B635101588ABCF61AF64DD0DA583B7EFB46785B144015FD058B222CB39DD42CA90

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                                                                                                        control_flow_graph 0 83aff9-83b056 call 7d2340 3 83b094-83b098 0->3 4 83b058-83b06b call 7bb567 0->4 6 83b09a-83b0bb call 7bb567 * 2 3->6 7 83b0dd-83b0e0 3->7 12 83b0c8 4->12 13 83b06d-83b092 call 7bb567 * 2 4->13 29 83b0bf-83b0c4 6->29 9 83b0e2-83b0e5 7->9 10 83b0f5-83b119 call 7b7510 call 7b7620 7->10 14 83b0e8-83b0ed call 7bb567 9->14 31 83b1d8-83b1e0 10->31 32 83b11f-83b178 call 7b7510 call 7b7620 call 7b7510 call 7b7620 call 7b7510 call 7b7620 10->32 17 83b0cb-83b0cf 12->17 13->29 14->10 23 83b0d1-83b0d7 17->23 24 83b0d9-83b0db 17->24 23->14 24->7 24->10 29->7 33 83b0c6 29->33 36 83b1e2-83b1fd call 7b7510 call 7b7620 31->36 37 83b20a-83b238 GetCurrentDirectoryW call 7cfe0b GetCurrentDirectoryW 31->37 82 83b1a6-83b1d6 GetSystemDirectoryW call 7cfe0b GetSystemDirectoryW 32->82 83 83b17a-83b195 call 7b7510 call 7b7620 32->83 33->17 36->37 53 83b1ff-83b208 call 7d4963 36->53 45 83b23c 37->45 48 83b240-83b244 45->48 51 83b246-83b270 call 7b9c6e * 3 48->51 52 83b275-83b285 call 8200d9 48->52 51->52 62 83b287-83b289 52->62 63 83b28b-83b2e1 call 8207c0 call 8206e6 call 8205a7 52->63 53->37 53->52 66 83b2ee-83b2f2 62->66 63->66 98 83b2e3 63->98 71 83b39a-83b3be CreateProcessW 66->71 72 83b2f8-83b321 call 8111c8 66->72 76 83b3c1-83b3d4 call 7cfe14 * 2 71->76 87 83b323-83b328 call 811201 72->87 88 83b32a call 8114ce 72->88 103 83b3d6-83b3e8 76->103 104 83b42f-83b43d CloseHandle 76->104 82->45 83->82 105 83b197-83b1a0 call 7d4963 83->105 97 83b32f-83b33c call 7d4963 87->97 88->97 113 83b347-83b357 call 7d4963 97->113 114 83b33e-83b345 97->114 98->66 109 83b3ea 103->109 110 83b3ed-83b3fc 103->110 107 83b43f-83b444 104->107 108 83b49c 104->108 105->48 105->82 115 83b451-83b456 107->115 116 83b446-83b44c CloseHandle 107->116 111 83b4a0-83b4a4 108->111 109->110 117 83b401-83b42a GetLastError call 7b630c call 7bcfa0 110->117 118 83b3fe 110->118 120 83b4b2-83b4bc 111->120 121 83b4a6-83b4b0 111->121 136 83b362-83b372 call 7d4963 113->136 137 83b359-83b360 113->137 114->113 114->114 124 83b463-83b468 115->124 125 83b458-83b45e CloseHandle 115->125 116->115 127 83b4e5-83b4f6 call 820175 117->127 118->117 128 83b4c4-83b4e3 call 7bcfa0 CloseHandle 120->128 129 83b4be 120->129 121->127 131 83b475-83b49a call 8209d9 call 83b536 124->131 132 83b46a-83b470 CloseHandle 124->132 125->124 128->127 129->128 131->111 132->131 146 83b374-83b37b 136->146 147 83b37d-83b398 call 7cfe14 * 3 136->147 137->136 137->137 146->146 146->147 147->76
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0083B198
                                                                                                                                                                                                                                                                                                                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0083B1B0
                                                                                                                                                                                                                                                                                                                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0083B1D4
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0083B200
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0083B214
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0083B236
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0083B332
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008205A7: GetStdHandle.KERNEL32(000000F6), ref: 008205C6
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0083B34B
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0083B366
                                                                                                                                                                                                                                                                                                                                                        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0083B3B6
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(00000000), ref: 0083B407
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 0083B439
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0083B44A
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0083B45C
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0083B46E
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 0083B4E3
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2178637699-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: fb9857db3f2af7f6ce7bdb43f41309ea7d3dce4f43c0f08feee97bb1151c8b0b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bfba125c42c2d90b8d22faba33be38814aadcdcf8a012eabf3d6b031a481c1b6
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fb9857db3f2af7f6ce7bdb43f41309ea7d3dce4f43c0f08feee97bb1151c8b0b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A9F17871608200DFC724EF24C895B6ABBE5FF85314F14855DF99A8B2A2DB35EC40CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Sleep$InputStateTimetime
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2764417729-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 55273827dc364a07f5e7ba8bb95e2c0a4b23a24d13fa307e99e19d278bfef39f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4125d85a3dc46137871eff63ddfb2b394bf8149a8ea515fa9fc83bf85e5de62c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 55273827dc364a07f5e7ba8bb95e2c0a4b23a24d13fa307e99e19d278bfef39f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6342F170608241DFDB78CF28C898BAABBA5FF45314F14855DE456C7291EBB8EC44CB92

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 007B2D07
                                                                                                                                                                                                                                                                                                                                                        • RegisterClassExW.USER32(00000030), ref: 007B2D31
                                                                                                                                                                                                                                                                                                                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007B2D42
                                                                                                                                                                                                                                                                                                                                                        • InitCommonControlsEx.COMCTL32(?), ref: 007B2D5F
                                                                                                                                                                                                                                                                                                                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007B2D6F
                                                                                                                                                                                                                                                                                                                                                        • LoadIconW.USER32(000000A9), ref: 007B2D85
                                                                                                                                                                                                                                                                                                                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007B2D94
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 5c9c7066c3ee1da42398b0de6f60ee8415a81a220b1ad89d780fe10640f7be95
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8879d03ee50ffe2237a71d7ec4411db2416d1c514cb5eaa59a6f2174bf05b97b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5c9c7066c3ee1da42398b0de6f60ee8415a81a220b1ad89d780fe10640f7be95
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F421BFB5912318AFDF40DFA8EC89BDDBFB8FB09700F00811AE611A62A0DBB55545CF91

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                                                                                                        control_flow_graph 462 7f065b-7f068b call 7f042f 465 7f068d-7f0698 call 7df2c6 462->465 466 7f06a6-7f06b2 call 7e5221 462->466 473 7f069a-7f06a1 call 7df2d9 465->473 471 7f06cb-7f0714 call 7f039a 466->471 472 7f06b4-7f06c9 call 7df2c6 call 7df2d9 466->472 481 7f0716-7f071f 471->481 482 7f0781-7f078a GetFileType 471->482 472->473 483 7f097d-7f0983 473->483 487 7f0756-7f077c GetLastError call 7df2a3 481->487 488 7f0721-7f0725 481->488 484 7f078c-7f07bd GetLastError call 7df2a3 CloseHandle 482->484 485 7f07d3-7f07d6 482->485 484->473 499 7f07c3-7f07ce call 7df2d9 484->499 491 7f07df-7f07e5 485->491 492 7f07d8-7f07dd 485->492 487->473 488->487 493 7f0727-7f0754 call 7f039a 488->493 496 7f07e9-7f0837 call 7e516a 491->496 497 7f07e7 491->497 492->496 493->482 493->487 504 7f0839-7f0845 call 7f05ab 496->504 505 7f0847-7f086b call 7f014d 496->505 497->496 499->473 504->505 511 7f086f-7f0879 call 7e86ae 504->511 512 7f087e-7f08c1 505->512 513 7f086d 505->513 511->483 515 7f08c3-7f08c7 512->515 516 7f08e2-7f08f0 512->516 513->511 515->516 518 7f08c9-7f08dd 515->518 519 7f097b 516->519 520 7f08f6-7f08fa 516->520 518->516 519->483 520->519 521 7f08fc-7f092f CloseHandle call 7f039a 520->521 524 7f0963-7f0977 521->524 525 7f0931-7f095d GetLastError call 7df2a3 call 7e5333 521->525 524->519 525->524
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007F039A: CreateFileW.KERNELBASE(00000000,00000000,?,007F0704,?,?,00000000,?,007F0704,00000000,0000000C), ref: 007F03B7
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 007F076F
                                                                                                                                                                                                                                                                                                                                                        • __dosmaperr.LIBCMT ref: 007F0776
                                                                                                                                                                                                                                                                                                                                                        • GetFileType.KERNELBASE(00000000), ref: 007F0782
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 007F078C
                                                                                                                                                                                                                                                                                                                                                        • __dosmaperr.LIBCMT ref: 007F0795
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 007F07B5
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 007F08FF
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 007F0931
                                                                                                                                                                                                                                                                                                                                                        • __dosmaperr.LIBCMT ref: 007F0938
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                                                                                                                                                        • String ID: H
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d4680d2a229a141b0ed13f6f578cfc159a766640b16e3c78f19a6708fe1e7274
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8a588d23177dece8688b7e48c3c2da8e2802d26e9bc10e0f19c3715b25a87639
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d4680d2a229a141b0ed13f6f578cfc159a766640b16e3c78f19a6708fe1e7274
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 00A12136A001088FDF19EF68D855BBE7BA0AB06320F14419EF9159F3D2DB399912CB91

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00881418,?,007B2E7F,?,?,?,00000000), ref: 007B3A78
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007B3379
                                                                                                                                                                                                                                                                                                                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 007B356A
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 007F318D
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 007F31CE
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 007F3210
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 007F3277
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 007F3286
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                                                                                                                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 98802146-2727554177
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e5194119d128190a150897f9a2ee91f8df9f234c8b7952931ae49dd3955772b9
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1236ad3a734e0ee10517d16f7ea4996bb8f5b3dd570e88656f6d5a9256f23afd
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e5194119d128190a150897f9a2ee91f8df9f234c8b7952931ae49dd3955772b9
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FD716A71405305EEC314EF69EC95AABBBE8FF85740B40042EF655C3271EB389A48CB62

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 007B2B8E
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 007B2B9D
                                                                                                                                                                                                                                                                                                                                                        • LoadIconW.USER32(00000063), ref: 007B2BB3
                                                                                                                                                                                                                                                                                                                                                        • LoadIconW.USER32(000000A4), ref: 007B2BC5
                                                                                                                                                                                                                                                                                                                                                        • LoadIconW.USER32(000000A2), ref: 007B2BD7
                                                                                                                                                                                                                                                                                                                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 007B2BEF
                                                                                                                                                                                                                                                                                                                                                        • RegisterClassExW.USER32(?), ref: 007B2C40
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B2CD4: GetSysColorBrush.USER32(0000000F), ref: 007B2D07
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B2CD4: RegisterClassExW.USER32(00000030), ref: 007B2D31
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007B2D42
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B2CD4: InitCommonControlsEx.COMCTL32(?), ref: 007B2D5F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007B2D6F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B2CD4: LoadIconW.USER32(000000A9), ref: 007B2D85
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007B2D94
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 423443420-4155596026
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d36d145775cf70a54cd6a93cdd3c0554e2b37fddffb127c3d916665bce99116b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e1a53c659e09ba698b868a48229e5b1025f05cc04d19d0575434c9adc7912632
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d36d145775cf70a54cd6a93cdd3c0554e2b37fddffb127c3d916665bce99116b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 03211874E01318ABDF109FA9EC59BA97FB8FB48B50F00402AE600A67A0DBB90541CF90

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                                                                                                        control_flow_graph 603 7b3170-7b3185 604 7b3187-7b318a 603->604 605 7b31e5-7b31e7 603->605 606 7b31eb 604->606 607 7b318c-7b3193 604->607 605->604 608 7b31e9 605->608 612 7f2dfb-7f2e23 call 7b18e2 call 7ce499 606->612 613 7b31f1-7b31f6 606->613 609 7b3199-7b319e 607->609 610 7b3265-7b326d PostQuitMessage 607->610 611 7b31d0-7b31d8 DefWindowProcW 608->611 617 7f2e7c-7f2e90 call 81bf30 609->617 618 7b31a4-7b31a8 609->618 620 7b3219-7b321b 610->620 619 7b31de-7b31e4 611->619 648 7f2e28-7f2e2f 612->648 614 7b31f8-7b31fb 613->614 615 7b321d-7b3244 SetTimer RegisterWindowMessageW 613->615 621 7f2d9c-7f2d9f 614->621 622 7b3201-7b320f KillTimer call 7b30f2 614->622 615->620 624 7b3246-7b3251 CreatePopupMenu 615->624 617->620 642 7f2e96 617->642 625 7b31ae-7b31b3 618->625 626 7f2e68-7f2e72 call 81c161 618->626 620->619 634 7f2dd7-7f2df6 MoveWindow 621->634 635 7f2da1-7f2da5 621->635 637 7b3214 call 7b3c50 622->637 624->620 631 7f2e4d-7f2e54 625->631 632 7b31b9-7b31be 625->632 638 7f2e77 626->638 631->611 636 7f2e5a-7f2e63 call 810ad7 631->636 640 7b3253-7b3263 call 7b326f 632->640 641 7b31c4-7b31ca 632->641 634->620 643 7f2da7-7f2daa 635->643 644 7f2dc6-7f2dd2 SetFocus 635->644 636->611 637->620 638->620 640->620 641->611 641->648 642->611 643->641 649 7f2db0-7f2dc1 call 7b18e2 643->649 644->620 648->611 653 7f2e35-7f2e48 call 7b30f2 call 7b3837 648->653 649->620 653->611
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,007B316A,?,?), ref: 007B31D8
                                                                                                                                                                                                                                                                                                                                                        • KillTimer.USER32(?,00000001,?,?,?,?,?,007B316A,?,?), ref: 007B3204
                                                                                                                                                                                                                                                                                                                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007B3227
                                                                                                                                                                                                                                                                                                                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,007B316A,?,?), ref: 007B3232
                                                                                                                                                                                                                                                                                                                                                        • CreatePopupMenu.USER32 ref: 007B3246
                                                                                                                                                                                                                                                                                                                                                        • PostQuitMessage.USER32(00000000), ref: 007B3267
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                                                                                                                                                        • String ID: TaskbarCreated
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 129472671-2362178303
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1259b21afa4a67701613f79caa8e3dd8923d90c87be23ebc42326a5417029e3a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5be5e475e4282f107cdbd0c368ab8e9007d225c3a477824adee4ca5d5b6b3240
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1259b21afa4a67701613f79caa8e3dd8923d90c87be23ebc42326a5417029e3a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C541DF3524060CABDF146BACDC1EBF93A5DFB06340F040125FA02C62A2DF7D9E8297A1

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                                                                                                        control_flow_graph 659 7b1410-7b1449 660 7b144f-7b1465 mciSendStringW 659->660 661 7f24b8-7f24b9 DestroyWindow 659->661 662 7b146b-7b1473 660->662 663 7b16c6-7b16d3 660->663 664 7f24c4-7f24d1 661->664 662->664 665 7b1479-7b1488 call 7b182e 662->665 666 7b16f8-7b16ff 663->666 667 7b16d5-7b16f0 UnregisterHotKey 663->667 668 7f24d3-7f24d6 664->668 669 7f2500-7f2507 664->669 680 7f250e-7f251a 665->680 681 7b148e-7b1496 665->681 666->662 672 7b1705 666->672 667->666 671 7b16f2-7b16f3 call 7b10d0 667->671 673 7f24d8-7f24e0 call 7b6246 668->673 674 7f24e2-7f24e5 FindClose 668->674 669->664 677 7f2509 669->677 671->666 672->663 679 7f24eb-7f24f8 673->679 674->679 677->680 679->669 685 7f24fa-7f24fb call 8232b1 679->685 682 7f251c-7f251e FreeLibrary 680->682 683 7f2524-7f252b 680->683 686 7b149c-7b14c1 call 7bcfa0 681->686 687 7f2532-7f253f 681->687 682->683 683->680 688 7f252d 683->688 685->669 697 7b14f8-7b1503 CoUninitialize 686->697 698 7b14c3 686->698 689 7f2566-7f256d 687->689 690 7f2541-7f255e VirtualFree 687->690 688->687 689->687 694 7f256f 689->694 690->689 693 7f2560-7f2561 call 823317 690->693 693->689 700 7f2574-7f2578 694->700 699 7b1509-7b150e 697->699 697->700 701 7b14c6-7b14f6 call 7b1a05 call 7b19ae 698->701 703 7f2589-7f2596 call 8232eb 699->703 704 7b1514-7b151e 699->704 700->699 705 7f257e-7f2584 700->705 701->697 717 7f2598 703->717 708 7b1707-7b1714 call 7cf80e 704->708 709 7b1524-7b15a5 call 7b988f call 7b1944 call 7b17d5 call 7cfe14 call 7b177c call 7b988f call 7bcfa0 call 7b17fe call 7cfe14 704->709 705->699 708->709 719 7b171a 708->719 721 7f259d-7f25bf call 7cfdcd 709->721 749 7b15ab-7b15cf call 7cfe14 709->749 717->721 719->708 727 7f25c1 721->727 731 7f25c6-7f25e8 call 7cfdcd 727->731 737 7f25ea 731->737 740 7f25ef-7f2611 call 7cfdcd 737->740 745 7f2613 740->745 748 7f2618-7f2625 call 8164d4 745->748 754 7f2627 748->754 749->731 755 7b15d5-7b15f9 call 7cfe14 749->755 757 7f262c-7f2639 call 7cac64 754->757 755->740 759 7b15ff-7b1619 call 7cfe14 755->759 764 7f263b 757->764 759->748 765 7b161f-7b1643 call 7b17d5 call 7cfe14 759->765 767 7f2640-7f264d call 823245 764->767 765->757 774 7b1649-7b1651 765->774 772 7f264f 767->772 775 7f2654-7f2661 call 8232cc 772->775 774->767 776 7b1657-7b1675 call 7b988f call 7b190a 774->776 781 7f2663 775->781 776->775 785 7b167b-7b1689 776->785 784 7f2668-7f2675 call 8232cc 781->784 791 7f2677 784->791 785->784 787 7b168f-7b16c5 call 7b988f * 3 call 7b1876 785->787 791->791
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 007B1459
                                                                                                                                                                                                                                                                                                                                                        • CoUninitialize.COMBASE ref: 007B14F8
                                                                                                                                                                                                                                                                                                                                                        • UnregisterHotKey.USER32(?), ref: 007B16DD
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(?), ref: 007F24B9
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 007F251E
                                                                                                                                                                                                                                                                                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 007F254B
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: close all
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 469580280-3243417748
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d6ed8506042d0a081d3b19510ba05b43e728a7c3a68a57620b1ab6a9830b981b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: cc7d8b2197844ac0e58605ec304b2ea3c3872b41510639b8d0aa08ce5ba6b43c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d6ed8506042d0a081d3b19510ba05b43e728a7c3a68a57620b1ab6a9830b981b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C8D15E31702212DFCB29DF14C4A9B69F7A5BF05700F9441ADE54AAB352DB38AD22CF51

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                                                                                                        control_flow_graph 808 7b2c63-7b2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007B2C91
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 007B2CB2
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,007B1CAD,?), ref: 007B2CC6
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,007B1CAD,?), ref: 007B2CCF
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$CreateShow
                                                                                                                                                                                                                                                                                                                                                        • String ID: AutoIt v3$edit
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f8a239ab4a8b37928b49ee257c92cae3bc18d85d01d30a449f6b0c38a79a9260
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 60fda538a2e8d333e4d7b47389421d17f7ca04c3680a8707d71cbaa5833db533
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f8a239ab4a8b37928b49ee257c92cae3bc18d85d01d30a449f6b0c38a79a9260
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 43F0DA755413947AEB71171BAC0CEB72EBDF7C7F50B00005AF900A26A0CA791852DBB0

                                                                                                                                                                                                                                                                                                                                                        Control-flow Graph

                                                                                                                                                                                                                                                                                                                                                        • Executed
                                                                                                                                                                                                                                                                                                                                                        • Not Executed
                                                                                                                                                                                                                                                                                                                                                        control_flow_graph 959 7b3b1c-7b3b27 960 7b3b99-7b3b9b 959->960 961 7b3b29-7b3b2e 959->961 962 7b3b8c-7b3b8f 960->962 961->960 963 7b3b30-7b3b48 RegOpenKeyExW 961->963 963->960 964 7b3b4a-7b3b69 RegQueryValueExW 963->964 965 7b3b6b-7b3b76 964->965 966 7b3b80-7b3b8b RegCloseKey 964->966 967 7b3b78-7b3b7a 965->967 968 7b3b90-7b3b97 965->968 966->962 969 7b3b7e 967->969 968->969 969->966
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,007B3B0F,SwapMouseButtons,00000004,?), ref: 007B3B40
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,007B3B0F,SwapMouseButtons,00000004,?), ref: 007B3B61
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,007B3B0F,SwapMouseButtons,00000004,?), ref: 007B3B83
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                                                                                                                                        • String ID: Control Panel\Mouse
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3677997916-824357125
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: aaec3f81ff09898a84b9ad4fe0d4ea5fcafb8922b79fe6c25e47f39e2e0a5db9
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 9d38b0f5344b554f51f5e0ab528a7cd7a5a17e3e46a56bf46c7cab4f0add6402
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: aaec3f81ff09898a84b9ad4fe0d4ea5fcafb8922b79fe6c25e47f39e2e0a5db9
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 63112AB5511208FFDB208FA5DC44AEFB7BCEF05744B104559A805D7114E6359E809760
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 007F33A2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                                                                                                                                                                                                                                                                                                                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 007B3A04
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: Line:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2289894680-1585850449
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: b219c1129509365c63f19b04f35ea8d8f7d2bb6dbb4f070d5462fa94264963ec
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c2d9a5d3c2a3724d77f4dce91b8d5b7178161273fced04ebf02d287a016a00d4
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b219c1129509365c63f19b04f35ea8d8f7d2bb6dbb4f070d5462fa94264963ec
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8831A571408304AAD725EB14DC49BEBB7ECBF40714F10451AF59993291EF7CAA89C7C2
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 007D0668
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D32A4: RaiseException.KERNEL32(?,?,?,007D068A,?,00881444,?,?,?,?,?,?,007D068A,007B1129,00878738,007B1129), ref: 007D3304
                                                                                                                                                                                                                                                                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 007D0685
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                                                                                                                                                        • String ID: Unknown exception
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3476068407-410509341
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 403e9e9922bec64525fcc52fc3b760283e5c9e2ca23a2276e1a5ee4aca278e82
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2ba0eed18da7c6e991da94069f5c0a75968269e1c7b7ba0a096af79c6d66e1cc
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 403e9e9922bec64525fcc52fc3b760283e5c9e2ca23a2276e1a5ee4aca278e82
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 27F0F42490020DF38B04B664E84EE5D777CAE00350B60803AB929D6795EF38EA2585C0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 007B1BF4
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 007B1BFC
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007B1C07
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 007B1C12
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 007B1C1A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 007B1C22
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B1B4A: RegisterWindowMessageW.USER32(00000004,?,007B12C4), ref: 007B1BA2
                                                                                                                                                                                                                                                                                                                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 007B136A
                                                                                                                                                                                                                                                                                                                                                        • OleInitialize.OLE32 ref: 007B1388
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000,00000000), ref: 007F24AB
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1986988660-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c0dae7988f3bfd3e9336ec9da35489214642f4a51d118ac9ff2bba423e50abd2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2a8378fe63216dd94af72982eb9a9d8d69743d40b6effe0dad25e46b102256fe
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c0dae7988f3bfd3e9336ec9da35489214642f4a51d118ac9ff2bba423e50abd2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1871A7B49122009ECB84EFBDE95EA953AEDFB88344794823AD10AC7262EF344447CF45
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 007B3A04
                                                                                                                                                                                                                                                                                                                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0081C259
                                                                                                                                                                                                                                                                                                                                                        • KillTimer.USER32(?,00000001,?,?), ref: 0081C261
                                                                                                                                                                                                                                                                                                                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0081C270
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3500052701-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 964d78b3f0c26f7d178fcfe11abdc4de4b65d45201251040ef2b621ed2325d75
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 90a0d2653d503d4944459ea0177ef50b17e8cbcacc58fcd4569eec99e69304b6
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 964d78b3f0c26f7d178fcfe11abdc4de4b65d45201251040ef2b621ed2325d75
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D1318170944344AFEB629F648859BEABBECFF16308F00049AD59AD7241C7746AC5CB51
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,007E85CC,?,00878CC8,0000000C), ref: 007E8704
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,007E85CC,?,00878CC8,0000000C), ref: 007E870E
                                                                                                                                                                                                                                                                                                                                                        • __dosmaperr.LIBCMT ref: 007E8739
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2583163307-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f5644c105a932bab965377306b92cbbe992053e6d738618300ba1049150bd1f2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 35639846571ea60e7556ceb2e599b3bc1fa38c7882d36c369d90a3c6c1a8ddcb
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f5644c105a932bab965377306b92cbbe992053e6d738618300ba1049150bd1f2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 61018E326072E056C2E06376694977E67494B8E77CF390119F81C8B1D3DEACCC81C252
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • TranslateMessage.USER32(?), ref: 007BDB7B
                                                                                                                                                                                                                                                                                                                                                        • DispatchMessageW.USER32(?), ref: 007BDB89
                                                                                                                                                                                                                                                                                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007BDB9F
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNELBASE(0000000A), ref: 007BDBB1
                                                                                                                                                                                                                                                                                                                                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00801CC9
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3288985973-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 813e0a7861990b16c54a5dac34dcf60ee2ce7a60d1a0886368226fcc9a72a924
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e4f47c47336a62e1463a136132c0c43af8a71ea40d637dfeaaf6e5361819339e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 813e0a7861990b16c54a5dac34dcf60ee2ce7a60d1a0886368226fcc9a72a924
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2CF05E306453409BEB70CBA48C4DFEA73ACFB45310F104628E61AC30C0EB349848CB25
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • __Init_thread_footer.LIBCMT ref: 007C17F6
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Init_thread_footer
                                                                                                                                                                                                                                                                                                                                                        • String ID: CALL
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 947f90e525a3178c7186af9d846e014ce1b12f2f4ed22d195d6617353ed0648d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: cafe3a304a03d0293577203725c671af39c01d09fbb21efc5572f62f5c856d8b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 947f90e525a3178c7186af9d846e014ce1b12f2f4ed22d195d6617353ed0648d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 22226870608241DFC714DF14C894F2ABBE1FF86314F64896DE4968B3A2D739E961CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetOpenFileNameW.COMDLG32(?), ref: 007F2C8C
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B3A97,?,?,007B2E7F,?,?,?,00000000), ref: 007B3AC2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007B2DC4
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                                                                                                                                                        • String ID: X
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 779396738-3081909835
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: dd658ede7d605a0d6f10dc25efd02c48eacab03035d2efcaf562261b1b1f4ee4
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 10f3d2c0e7e985bb5eb1991a23a38f256f952c6aee1e8d1ada9d2b0d514219f7
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: dd658ede7d605a0d6f10dc25efd02c48eacab03035d2efcaf562261b1b1f4ee4
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 68218471A002589ACB419F94C8497EE7BF8AF49704F108059E505A7345EBB89A8A8F61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 007B3908
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1144537725-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e3db5b9feb45201bc3323ffaae4b3365c3d8f94a2cd7344bbd0d8adb601a5007
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: df33565e570c24ec0ab75f2d69afd495e636fc64f8d39664cf9192ee67be9680
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e3db5b9feb45201bc3323ffaae4b3365c3d8f94a2cd7344bbd0d8adb601a5007
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4E314B705047019FD761DF28D8897D7BBE8FB49708F00092EF59987250E779AA85CB52
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • timeGetTime.WINMM ref: 007CF661
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007BD730: GetInputState.USER32 ref: 007BD807
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000), ref: 0080F2DE
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: InputSleepStateTimetime
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4149333218-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4970ad3803d86da19200ac83d54c2a3d649c6730887acee500e343d1fe9a05a0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: dcbc74672a9ec7867914542cb0cd79649f38e54f84843ab70401282a19d0b591
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4970ad3803d86da19200ac83d54c2a3d649c6730887acee500e343d1fe9a05a0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5EF08C352402059FD360EF69D849BAAB7E8FF4A760F004029E85AC72A1DBB0A800CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007B4EDD,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E9C
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 007B4EAE
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B4E90: FreeLibrary.KERNEL32(00000000,?,?,007B4EDD,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4EC0
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4EFD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007F3CDE,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E62
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 007B4E74
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B4E59: FreeLibrary.KERNEL32(00000000,?,?,007F3CDE,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E87
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2632591731-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 635c82eb9184576e9e06d0f7ea5f5b9d0bdf1cb7005edcea2c48a96de9a469ef
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: f39bb18074390a2396b92a63e87437c692f9dd7d5700f41b38081963b2b192de
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 635c82eb9184576e9e06d0f7ea5f5b9d0bdf1cb7005edcea2c48a96de9a469ef
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 23119132610219EADB14BB64DC0ABFD77A5AF40B10F148429F542AB2D2EEB8DA459B50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: __wsopen_s
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3347428461-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 48cd4ce9dd3c3a9c8f2d37773703f26335cc45b27659d5aeb0d35d79e37b44f7
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 19c8dad1ae945c52cf00985d9f9c5ca92f61fca66a11f58615c14e53e089d38f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 48cd4ce9dd3c3a9c8f2d37773703f26335cc45b27659d5aeb0d35d79e37b44f7
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B711487190414AEFCB05DF59E94099A7BF4FF49310F104059F808AB352DA30EA11CBA5
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E4C7D: RtlAllocateHeap.NTDLL(00000008,007B1129,00000000,?,007E2E29,00000001,00000364,?,?,?,007DF2DE,007E3863,00881444,?,007CFDF5,?), ref: 007E4CBE
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E506C
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AllocateHeap_free
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 614378929-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1b047f7810a48538705bd989243e77eb370b89b13573f9134d7fb08d3f518431
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 29012B722057489BE3218E66984595AFBECFB8D374F25061DF184932C0E674A805C674
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ea18de7b83e1c395e7701adc6edcabc862f7046c42db6bf5be5b3a23b2ee40f7
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 35F02D32511A14D6C7323A668C0DB5A33BC9F52334F10071BF525973D2DB7CE80285A6
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • RtlAllocateHeap.NTDLL(00000008,007B1129,00000000,?,007E2E29,00000001,00000364,?,?,?,007DF2DE,007E3863,00881444,?,007CFDF5,?), ref: 007E4CBE
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AllocateHeap
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c6f8d53a5a609c4af1f35b772a75a4987f4809cc9ef738a78c3cf4a4d8180228
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: dbac7ee847919760a726093c3af6e86d14240725c9dfb424580813b2a28b93de
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c6f8d53a5a609c4af1f35b772a75a4987f4809cc9ef738a78c3cf4a4d8180228
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6AF0E9326032A4A7DB315F679D09B5A3798BF457A0B385512F81AA76B1CA3CD80186F0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AllocateHeap
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1279760036-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9cdb24ab57ee2d66a88d578fc3cb559b09a81f302ffec679f242f051037c038a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 9fac118bfbabbf2e9f875c06f57fba4abcd4b713562dcc3be7837c1025fb3c69
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9cdb24ab57ee2d66a88d578fc3cb559b09a81f302ffec679f242f051037c038a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 26E065321032A4ABE63126A79D0DB9A3759AB867B0F190123BC1597691DB2DDD0182F1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(?,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4F6D
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FreeLibrary
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3664257935-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 39da7279b185725aab6ba2d80a57a8d5b1770773a7b243db8621b95d806bdb3d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: db4ad80747efecfdadd3329c095c3d8defde3b3c0a65fe3ae13450e5a87b7cef
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 39da7279b185725aab6ba2d80a57a8d5b1770773a7b243db8621b95d806bdb3d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D4F03971505752CFDB349F64D494AA2BBF4FF14329328897EE1EA83622C7399844DF10
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • Shell_NotifyIconW.SHELL32(00000002,?), ref: 007B314E
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: IconNotifyShell_
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1144537725-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 62e9eec14f0dde55a2f273c9b18f82b81c6839c8a2e3b72a52ec1084ff2faaa9
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: d3a3a4d931ad5432b3029dbc190efe177d839bb227aeda24295183e75ee7da3d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 62e9eec14f0dde55a2f273c9b18f82b81c6839c8a2e3b72a52ec1084ff2faaa9
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 99F037709143189FEB529B28DC4A7D57BBCB701708F0000E5A54896292DB785789CF51
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007B2DC4
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 541455249-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6cf9934e50a66d46a1edf6523045a476b49e83081b569989b97c762570c74d9f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b3f7c9bbff3f365484ad9ca56525ff18cf532009276b01c8933a953149444733
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6cf9934e50a66d46a1edf6523045a476b49e83081b569989b97c762570c74d9f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 29E0CD766011249BC71092589C09FEA77EDDFC8790F040071FE09D7248DAA4AD80C550
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007B3908
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007BD730: GetInputState.USER32 ref: 007BD807
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 007B2B6B
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 007B314E
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3667716007-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 239cf67fbfeae930ab4691ac15a90aec66e9909731f19716ef892bece4d87d15
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b560895cf7c5647bce0ec895f962b894b6cb2d3b75af866a4e33fb29ee46d7d2
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 239cf67fbfeae930ab4691ac15a90aec66e9909731f19716ef892bece4d87d15
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 27E0863130424486CA04BBB4985E7EDA75EABD1751F40153EF24283163DE2D498A8352
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateFileW.KERNELBASE(00000000,00000000,?,007F0704,?,?,00000000,?,007F0704,00000000,0000000C), ref: 007F03B7
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CreateFile
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 823142352-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 863bca47567c81481c8770c676942e9efd103e18faa43f2b984bc456a4368d84
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 754634fb71f6034882e362a0cc5cb08bfc37607b2adb99d32f34c98cb0075d29
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 863bca47567c81481c8770c676942e9efd103e18faa43f2b984bc456a4368d84
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FDD06C3204010DBBDF028F84DD06EDA3BAAFB48714F014000BE1856020C732E821EB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 007B1CBC
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: InfoParametersSystem
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3098949447-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: be112453b1a50494ff87e7b10596b1d32751c5e35702e2d38d76967e7903fee9
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0d648e9656b78ef6b0d63044c8c3925663222103df78edc5e0dfa631605da1d8
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: be112453b1a50494ff87e7b10596b1d32751c5e35702e2d38d76967e7903fee9
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 02C0923A2C0304AFF6548B88FC4EF547768B348B00F048001F709A96E3C7A22820EB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0084961A
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0084965B
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0084969F
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008496C9
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32 ref: 008496F2
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(00000011), ref: 0084978B
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(00000009), ref: 00849798
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008497AE
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(00000010), ref: 008497B8
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008497E9
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32 ref: 00849810
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001030,?,00847E95), ref: 00849918
                                                                                                                                                                                                                                                                                                                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0084992E
                                                                                                                                                                                                                                                                                                                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00849941
                                                                                                                                                                                                                                                                                                                                                        • SetCapture.USER32(?), ref: 0084994A
                                                                                                                                                                                                                                                                                                                                                        • ClientToScreen.USER32(?,?), ref: 008499AF
                                                                                                                                                                                                                                                                                                                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 008499BC
                                                                                                                                                                                                                                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008499D6
                                                                                                                                                                                                                                                                                                                                                        • ReleaseCapture.USER32 ref: 008499E1
                                                                                                                                                                                                                                                                                                                                                        • GetCursorPos.USER32(?), ref: 00849A19
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00849A26
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00849A80
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32 ref: 00849AAE
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00849AEB
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32 ref: 00849B1A
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00849B3B
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00849B4A
                                                                                                                                                                                                                                                                                                                                                        • GetCursorPos.USER32(?), ref: 00849B68
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00849B75
                                                                                                                                                                                                                                                                                                                                                        • GetParent.USER32(?), ref: 00849B93
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00849BFA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32 ref: 00849C2B
                                                                                                                                                                                                                                                                                                                                                        • ClientToScreen.USER32(?,?), ref: 00849C84
                                                                                                                                                                                                                                                                                                                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00849CB4
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00849CDE
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32 ref: 00849D01
                                                                                                                                                                                                                                                                                                                                                        • ClientToScreen.USER32(?,?), ref: 00849D4E
                                                                                                                                                                                                                                                                                                                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00849D82
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9944: GetWindowLongW.USER32(?,000000EB), ref: 007C9952
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00849E05
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                                                                                                                                                                        • String ID: @GUI_DRAGID$F
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3429851547-4164748364
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1e8a45da8b3bab601a96c25d6e683745d0a36805c0cca96be036a90e457de754
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a2b2a6dc32ec33dfe7574b9e76dc95a8f42d96c71219bd29a2cc688098abe6ca
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1e8a45da8b3bab601a96c25d6e683745d0a36805c0cca96be036a90e457de754
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0E427834204209AFDB60CF68CC88EABBBE9FF59314F114619F699C72A1E731A850CF51
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008448F3
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00844908
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00844927
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0084494B
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0084495C
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0084497B
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008449AE
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008449D4
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00844A0F
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00844A56
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00844A7E
                                                                                                                                                                                                                                                                                                                                                        • IsMenu.USER32(?), ref: 00844A97
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00844AF2
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00844B20
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00844B94
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00844BE3
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00844C82
                                                                                                                                                                                                                                                                                                                                                        • wsprintfW.USER32 ref: 00844CAE
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00844CC9
                                                                                                                                                                                                                                                                                                                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00844CF1
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00844D13
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00844D33
                                                                                                                                                                                                                                                                                                                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00844D5A
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                                                                                                                                                                        • String ID: %d/%02d/%02d
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4054740463-328681919
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a434b73d4d7d42a63076f3e09aa64fd846393f9b66a08f4771d7c56cde1092d4
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2d76dbcbfb1c467eaede8a8a6eebf3288cd8e3f7bdd12fba6de3ce3e65db71d8
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a434b73d4d7d42a63076f3e09aa64fd846393f9b66a08f4771d7c56cde1092d4
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4B12ED71A00618ABEB249F28CC49FAE7BF8FF45714F105129F916EB2E1DB789941CB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 007CF998
                                                                                                                                                                                                                                                                                                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0080F474
                                                                                                                                                                                                                                                                                                                                                        • IsIconic.USER32(00000000), ref: 0080F47D
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(00000000,00000009), ref: 0080F48A
                                                                                                                                                                                                                                                                                                                                                        • SetForegroundWindow.USER32(00000000), ref: 0080F494
                                                                                                                                                                                                                                                                                                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0080F4AA
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0080F4B1
                                                                                                                                                                                                                                                                                                                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0080F4BD
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0080F4CE
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0080F4D6
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0080F4DE
                                                                                                                                                                                                                                                                                                                                                        • SetForegroundWindow.USER32(00000000), ref: 0080F4E1
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0080F4F6
                                                                                                                                                                                                                                                                                                                                                        • keybd_event.USER32(00000012,00000000), ref: 0080F501
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0080F50B
                                                                                                                                                                                                                                                                                                                                                        • keybd_event.USER32(00000012,00000000), ref: 0080F510
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0080F519
                                                                                                                                                                                                                                                                                                                                                        • keybd_event.USER32(00000012,00000000), ref: 0080F51E
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0080F528
                                                                                                                                                                                                                                                                                                                                                        • keybd_event.USER32(00000012,00000000), ref: 0080F52D
                                                                                                                                                                                                                                                                                                                                                        • SetForegroundWindow.USER32(00000000), ref: 0080F530
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0080F557
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                                                                                                                                                        • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 41aaca6f352644f508968b125e64c89777d2f0a14f8677a0544ec519bbcc793c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8f1286e31ad4cc59d2319fa426ea0de351e031c5736c12bdc7ecc7a262a87d08
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 41aaca6f352644f508968b125e64c89777d2f0a14f8677a0544ec519bbcc793c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BC315E75A41218BBEB706BB55C4AFBF7E6CFB45B50F114029FA05E61D2C6B06D00EAA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0081170D
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0081173A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008116C3: GetLastError.KERNEL32 ref: 0081174A
                                                                                                                                                                                                                                                                                                                                                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00811286
                                                                                                                                                                                                                                                                                                                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 008112A8
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 008112B9
                                                                                                                                                                                                                                                                                                                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 008112D1
                                                                                                                                                                                                                                                                                                                                                        • GetProcessWindowStation.USER32 ref: 008112EA
                                                                                                                                                                                                                                                                                                                                                        • SetProcessWindowStation.USER32(00000000), ref: 008112F4
                                                                                                                                                                                                                                                                                                                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00811310
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008111FC), ref: 008110D4
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110BF: CloseHandle.KERNEL32(?,?,008111FC), ref: 008110E9
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                                                                                                                                                        • String ID: $default$winsta0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 22674027-1027155976
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 073a010d8cd6413368c564edc700e770aff1bb55a93fb4eadf82d03e7ce55c74
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c7241843eba24ea5ca14d90ddefd302ada9300f71624874dfec6e8beff8b884e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 073a010d8cd6413368c564edc700e770aff1bb55a93fb4eadf82d03e7ce55c74
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9F818D71900209ABDF109FA8DC4DBEE7BBEFF05B04F144129FA10E62A0D7758984CB25
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00811114
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811120
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 0081112F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811136
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0081114D
                                                                                                                                                                                                                                                                                                                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00810BCC
                                                                                                                                                                                                                                                                                                                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00810C00
                                                                                                                                                                                                                                                                                                                                                        • GetLengthSid.ADVAPI32(?), ref: 00810C17
                                                                                                                                                                                                                                                                                                                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00810C51
                                                                                                                                                                                                                                                                                                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00810C6D
                                                                                                                                                                                                                                                                                                                                                        • GetLengthSid.ADVAPI32(?), ref: 00810C84
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00810C8C
                                                                                                                                                                                                                                                                                                                                                        • HeapAlloc.KERNEL32(00000000), ref: 00810C93
                                                                                                                                                                                                                                                                                                                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00810CB4
                                                                                                                                                                                                                                                                                                                                                        • CopySid.ADVAPI32(00000000), ref: 00810CBB
                                                                                                                                                                                                                                                                                                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00810CEA
                                                                                                                                                                                                                                                                                                                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00810D0C
                                                                                                                                                                                                                                                                                                                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00810D1E
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810D45
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 00810D4C
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810D55
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 00810D5C
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810D65
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 00810D6C
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00810D78
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 00810D7F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811193: GetProcessHeap.KERNEL32(00000008,00810BB1,?,00000000,?,00810BB1,?), ref: 008111A1
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00810BB1,?), ref: 008111A8
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00810BB1,?), ref: 008111B7
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4175595110-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d1799a26887fade3429e3cdb037bee204b548328eb4c2cd62acf4434b849098c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8b09cbb75c6769ae384a2d5dc96db1eb726c9f5735e92be48380aaf8011057e9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d1799a26887fade3429e3cdb037bee204b548328eb4c2cd62acf4434b849098c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A4715CB690120AABDF10DFA4EC48BEEBBBCFF05300F144615E915E6191D7B5A985CFA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • OpenClipboard.USER32(0084CC08), ref: 0082EB29
                                                                                                                                                                                                                                                                                                                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0082EB37
                                                                                                                                                                                                                                                                                                                                                        • GetClipboardData.USER32(0000000D), ref: 0082EB43
                                                                                                                                                                                                                                                                                                                                                        • CloseClipboard.USER32 ref: 0082EB4F
                                                                                                                                                                                                                                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0082EB87
                                                                                                                                                                                                                                                                                                                                                        • CloseClipboard.USER32 ref: 0082EB91
                                                                                                                                                                                                                                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0082EBBC
                                                                                                                                                                                                                                                                                                                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0082EBC9
                                                                                                                                                                                                                                                                                                                                                        • GetClipboardData.USER32(00000001), ref: 0082EBD1
                                                                                                                                                                                                                                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0082EBE2
                                                                                                                                                                                                                                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0082EC22
                                                                                                                                                                                                                                                                                                                                                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 0082EC38
                                                                                                                                                                                                                                                                                                                                                        • GetClipboardData.USER32(0000000F), ref: 0082EC44
                                                                                                                                                                                                                                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 0082EC55
                                                                                                                                                                                                                                                                                                                                                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0082EC77
                                                                                                                                                                                                                                                                                                                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0082EC94
                                                                                                                                                                                                                                                                                                                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0082ECD2
                                                                                                                                                                                                                                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0082ECF3
                                                                                                                                                                                                                                                                                                                                                        • CountClipboardFormats.USER32 ref: 0082ED14
                                                                                                                                                                                                                                                                                                                                                        • CloseClipboard.USER32 ref: 0082ED59
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 420908878-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1d98e9f0f2eff1943ea2fc5d60627db7539f5ec9868f9768dbc750fd3e35d347
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 70d26ad48a605bd91c8d96eeaf04639676e02377722b521ce965b4de1a8722eb
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1d98e9f0f2eff1943ea2fc5d60627db7539f5ec9868f9768dbc750fd3e35d347
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3C61EE38204301AFD300EF24E888F6ABBA8FF85714F14441DF956D72A2CB75E985CB66
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 008269BE
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00826A12
                                                                                                                                                                                                                                                                                                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00826A4E
                                                                                                                                                                                                                                                                                                                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00826A75
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00826AB2
                                                                                                                                                                                                                                                                                                                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00826ADF
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: daa5dd59ef565ac3564eae9c7c897fad44d51b0add3f2f8fc8d83dd560099b59
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ed90acc4aeb2a21a10b72b3fc399f026b19da73d77c2113dcdb23d7b4317ce26
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: daa5dd59ef565ac3564eae9c7c897fad44d51b0add3f2f8fc8d83dd560099b59
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FCD15172508350EFC314EBA4D885EABB7ECBF88704F04491DF699D6191EB78DA44CB62
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 00829663
                                                                                                                                                                                                                                                                                                                                                        • GetFileAttributesW.KERNEL32(?), ref: 008296A1
                                                                                                                                                                                                                                                                                                                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 008296BB
                                                                                                                                                                                                                                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 008296D3
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 008296DE
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 008296FA
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0082974A
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(00876B7C), ref: 00829768
                                                                                                                                                                                                                                                                                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00829772
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0082977F
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0082978F
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                                                                                                                                                        • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1409584000-438819550
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: dd0f80fcafb6b06a82d5abcade86095e01ae9253bfbadce2d238f0f4904a830e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a4eabb6f3b957525a1e0d0f1fca76b82c4190295822f59410e6870ee7d641fc0
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: dd0f80fcafb6b06a82d5abcade86095e01ae9253bfbadce2d238f0f4904a830e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4A31D3365016296FDB10AFB4EC48ADE77BCFF0A320F144156F955E2190EB74DD84CA14
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 008297BE
                                                                                                                                                                                                                                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00829819
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00829824
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00829840
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00829890
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(00876B7C), ref: 008298AE
                                                                                                                                                                                                                                                                                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 008298B8
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 008298C5
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 008298D5
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0081DB00
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                                                                                                                                                        • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2640511053-438819550
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a748d0f29ed6b0314ecff41715ab36c61ab2c75d1eaf524cbb939a85339f79de
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 7e0e3106991e1674fe1058e4c1251df1acec521ed94aa7b3b2f577fc8bdef7eb
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a748d0f29ed6b0314ecff41715ab36c61ab2c75d1eaf524cbb939a85339f79de
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B531C3315016296FDB14EFB4EC48ADE77BCFF06330F184166E994E2290EB75D984CA24
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0083B6AE,?,?), ref: 0083C9B5
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083C9F1
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA68
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA9E
                                                                                                                                                                                                                                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083BF3E
                                                                                                                                                                                                                                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0083BFA9
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0083BFCD
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0083C02C
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0083C0E7
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0083C154
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0083C1E9
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0083C23A
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0083C2E3
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0083C382
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0083C38F
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3102970594-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: bfa82da31a739400e8d03d4bc6d023aa8d880ea7d81e262c09b08af62245697b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5e2dfdf008dbd6dfe70dcdf02a6c6d47944671222260474cea57d0a48a30e435
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bfa82da31a739400e8d03d4bc6d023aa8d880ea7d81e262c09b08af62245697b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A8020B716042009FD714DF28C895E2ABBE5FF89318F18849DF84ADB2A2DB35ED45CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetLocalTime.KERNEL32(?), ref: 00828257
                                                                                                                                                                                                                                                                                                                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00828267
                                                                                                                                                                                                                                                                                                                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00828273
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00828310
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00828324
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00828356
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0082838C
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00828395
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                                                                                                                                                        • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1464919966-438819550
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f367a6cad3911eea264db868a3cc08a5596261d8784aac0b1990c7e6ae2c03b7
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: dea6c7f11a398fcb72b7037e5e2bc77df8fc9faa8ef28f06cf2e392f1f438c6f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f367a6cad3911eea264db868a3cc08a5596261d8784aac0b1990c7e6ae2c03b7
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 99614972504315DFCB10EF64D848AAEB3E8FF89314F04891AF999C7251EB35E985CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B3A97,?,?,007B2E7F,?,?,?,00000000), ref: 007B3AC2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081E199: GetFileAttributesW.KERNEL32(?,0081CF95), ref: 0081E19A
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0081D122
                                                                                                                                                                                                                                                                                                                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0081D1DD
                                                                                                                                                                                                                                                                                                                                                        • MoveFileW.KERNEL32(?,?), ref: 0081D1F0
                                                                                                                                                                                                                                                                                                                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0081D20D
                                                                                                                                                                                                                                                                                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0081D237
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0081D21C,?,?), ref: 0081D2B2
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000,?,?,?), ref: 0081D253
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0081D264
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                                                                                                                                                        • String ID: \*.*
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 161cfc07d4372b4f91d790e984c96cab9b67171a26ec4324f677fbaa3a429048
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e49f302a25271c7ac3816de4f1782a724c02ec216c230a78ba32f49f66f75e14
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 161cfc07d4372b4f91d790e984c96cab9b67171a26ec4324f677fbaa3a429048
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4A617B3180120DABCF05EBE4D996AEDB7B9FF15300F204165E512B7191EB34AF89CB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1737998785-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 3bcd0783a50432ccf3d0753468cd39f40426e13fffae51f504e4fffc7c0f9ee6
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3ff1f48c32f14d47a0e6de395c9607a1fd91ef17d9bb7008202ec32c13f61d73
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3bcd0783a50432ccf3d0753468cd39f40426e13fffae51f504e4fffc7c0f9ee6
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FC419D39205621AFD720DF19E888B29BBE5FF45318F15C099E419CB762C779EC81CB94
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0081170D
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0081173A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008116C3: GetLastError.KERNEL32 ref: 0081174A
                                                                                                                                                                                                                                                                                                                                                        • ExitWindowsEx.USER32(?,00000000), ref: 0081E932
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                                                                                                                                                        • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: cb0c26ebf1a2fffccbd555dfa1ff09c2477707705d2a957453906c707ef07568
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: f05e902cbe1d76b5fab7efaa79a9f1252d2d62bb1f6d34d90c7d2a4b6a704466
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: cb0c26ebf1a2fffccbd555dfa1ff09c2477707705d2a957453906c707ef07568
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2A014932A10315ABEB5426B8AC8AFFF765CFF18744F150422FD13E21D1D6A55CC085A0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00831276
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 00831283
                                                                                                                                                                                                                                                                                                                                                        • bind.WSOCK32(00000000,?,00000010), ref: 008312BA
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 008312C5
                                                                                                                                                                                                                                                                                                                                                        • closesocket.WSOCK32(00000000), ref: 008312F4
                                                                                                                                                                                                                                                                                                                                                        • listen.WSOCK32(00000000,00000005), ref: 00831303
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 0083130D
                                                                                                                                                                                                                                                                                                                                                        • closesocket.WSOCK32(00000000), ref: 0083133C
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 540024437-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 29a7206ac2e6b3cc96c30922d75d707f2dd61475ed1625ae6a819706081f3637
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1d610b6c898d3fec574b7a19f6f0ba50f2cf742c680a281f7d56ebe111381221
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 29a7206ac2e6b3cc96c30922d75d707f2dd61475ed1625ae6a819706081f3637
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 02417F356001009FDB10DF64C488B6ABBE5FF86718F188198E856DF296C775ED81CBE1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EB9D4
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EB9F8
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EBB7F
                                                                                                                                                                                                                                                                                                                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00853700), ref: 007EBB91
                                                                                                                                                                                                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0088121C,000000FF,00000000,0000003F,00000000,?,?), ref: 007EBC09
                                                                                                                                                                                                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00881270,000000FF,?,0000003F,00000000,?), ref: 007EBC36
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EBD4B
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 314583886-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 088f08c97735b6106ca4b38b2fd0c755e2f0034dd87e3d1044ee174c8d939098
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bf3842e2f914cb4fbedbc1a8f5c37f160dd92f843a3ba5b27b6454c23c9e57f0
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 088f08c97735b6106ca4b38b2fd0c755e2f0034dd87e3d1044ee174c8d939098
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 89C12971906285DFCF20DF7A8C45AAB7FB9EF49310F1441AAE494D7252DB389E42CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B3A97,?,?,007B2E7F,?,?,?,00000000), ref: 007B3AC2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081E199: GetFileAttributesW.KERNEL32(?,0081CF95), ref: 0081E19A
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0081D420
                                                                                                                                                                                                                                                                                                                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0081D470
                                                                                                                                                                                                                                                                                                                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0081D481
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0081D498
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 0081D4A1
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                                                                                                                                                        • String ID: \*.*
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 668c281f38bdd11c30c64302713d9bd508da6a8178a1e134c198521e0c9b8287
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 46a68ffa8539213f2c77d5263a435ddde62a08f5216d3627c91567542c066943
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 668c281f38bdd11c30c64302713d9bd508da6a8178a1e134c198521e0c9b8287
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3A319C71009355ABC300EF64C899AEFB7ECBE92304F444A1DF5E593191EB34AA49CB67
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: __floor_pentium4
                                                                                                                                                                                                                                                                                                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4168288129-2761157908
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: bc57be55b44c0240b66c3747f25bed99f292ed244f8c71cab34a3e7298901e05
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ff0a9df85205f84eb1eb104872bac5011a686f8a6c19bdb6e1503f1d18d1af3d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bc57be55b44c0240b66c3747f25bed99f292ed244f8c71cab34a3e7298901e05
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B0C27B72E066688FDB25CF29CD407EAB7B5EB48305F1445EAD84DE7241E778AE818F40
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008264DC
                                                                                                                                                                                                                                                                                                                                                        • CoInitialize.OLE32(00000000), ref: 00826639
                                                                                                                                                                                                                                                                                                                                                        • CoCreateInstance.OLE32(0084FCF8,00000000,00000001,0084FB68,?), ref: 00826650
                                                                                                                                                                                                                                                                                                                                                        • CoUninitialize.OLE32 ref: 008268D4
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: .lnk
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 886957087-24824748
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f893096d4e7322b891f1f0eef19796161fb3015edb03fc595b929e2a869b9737
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4677cc5c1f57fbde6181ca4938c1c62aecb4db10334f93fadb96429c1f53431a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f893096d4e7322b891f1f0eef19796161fb3015edb03fc595b929e2a869b9737
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C8D15871508211AFC304EF24C885AABB7E8FF98704F14496DF595CB2A1EB34ED45CBA2
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32(?,?,00000000), ref: 008322E8
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0082E4EC: GetWindowRect.USER32(?,?), ref: 0082E504
                                                                                                                                                                                                                                                                                                                                                        • GetDesktopWindow.USER32 ref: 00832312
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000), ref: 00832319
                                                                                                                                                                                                                                                                                                                                                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00832355
                                                                                                                                                                                                                                                                                                                                                        • GetCursorPos.USER32(?), ref: 00832381
                                                                                                                                                                                                                                                                                                                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008323DF
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2387181109-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f06ed5bdcac63c6205850c3c8191deb3677bd4343c5f01638555030887f8093e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 946e2557c38b3416bf38cb2bbc364231dc1a472b907eadae8f6ae49a9e72cdea
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f06ed5bdcac63c6205850c3c8191deb3677bd4343c5f01638555030887f8093e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6C31EB72505315ABD720DF18C848A9BBBADFFC9314F000A19F985D7291DB34EA08CBD2
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00829B78
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00829C8B
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00823874: GetInputState.USER32 ref: 008238CB
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00823874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00823966
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00829BA8
                                                                                                                                                                                                                                                                                                                                                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00829C75
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1972594611-438819550
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8d6dd3521b0e469653de16e939843667445395c3c7d063fb045469a66e6013e0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4a4664865148f167111ad4607857d5179e4b70d8b033192ae8a2877702140989
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8d6dd3521b0e469653de16e939843667445395c3c7d063fb045469a66e6013e0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3F418E7190021AAFDF55DF64D889AEEBBB8FF05310F24405AE855E2291EB349E84CF60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 007C9A4E
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(0000000F), ref: 007C9B23
                                                                                                                                                                                                                                                                                                                                                        • SetBkColor.GDI32(?,00000000), ref: 007C9B36
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Color$LongProcWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3131106179-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 25d334b42d0d155e1977b6d2f3a241c4b62233b5837774586cd6a0791387cd1b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 250f5027b649dc180fd2d61af20620e28a309c606707483054bb19aef8032d35
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 25d334b42d0d155e1977b6d2f3a241c4b62233b5837774586cd6a0791387cd1b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 27A127B1609444BEE7B5AA2C8C4DF7F2B9DFB42340B15811DF212D66D1CA29AD01D376
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0083307A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083304E: _wcslen.LIBCMT ref: 0083309B
                                                                                                                                                                                                                                                                                                                                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0083185D
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 00831884
                                                                                                                                                                                                                                                                                                                                                        • bind.WSOCK32(00000000,?,00000010), ref: 008318DB
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 008318E6
                                                                                                                                                                                                                                                                                                                                                        • closesocket.WSOCK32(00000000), ref: 00831915
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1601658205-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d643066a3f3dfbbcfcfef5ab8d7823a607e92763bd3d5455d51584a6bad5b97c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 908772a10ccc822ab6519cbdc44b03cba4dc68ec11ef0de54987b4f9a4fd0b4f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d643066a3f3dfbbcfcfef5ab8d7823a607e92763bd3d5455d51584a6bad5b97c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BC519175A00200AFDB10AF24C88AF6A77E5EB85718F08849CF9069F393C775AD41CBE1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 292994002-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: eaa3a7f3fcdbe3e69c1735bdcd48ac49dffe81db14292d2135ea042a598253d6
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b6cf2a1207dfd86d62ba0327f0e5ecbda89ab54a4ea887ae4226030dd16777e2
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: eaa3a7f3fcdbe3e69c1735bdcd48ac49dffe81db14292d2135ea042a598253d6
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5C21D3317412159FDB208F1ADC88B6A7BE9FF95315B198058E84ACB351C775DC82CB90
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-1546025612
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4e26d3e98fa97253bf5ee3e623b83e6f72ca883769504f5c79c6217fe26746d2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a935b0329c206711c9a0025703c797e44efb9536168389ab3c51ab5513a98be9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4e26d3e98fa97253bf5ee3e623b83e6f72ca883769504f5c79c6217fe26746d2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8CA24A70A0021ECBDF64CF58C8407FDB7B5BB54314F2481AAEA15AB385EB789D81DB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0081AAAC
                                                                                                                                                                                                                                                                                                                                                        • SetKeyboardState.USER32(00000080), ref: 0081AAC8
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0081AB36
                                                                                                                                                                                                                                                                                                                                                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0081AB88
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 432972143-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 595f3f1a9d7b8a444da205aa039bcf3af491694b3e74a3d8ac1a3cd6b893f401
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c888791674a9e236ec8f1967d991f9ed7eb46355b3642917957b297c6a71b242
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 595f3f1a9d7b8a444da205aa039bcf3af491694b3e74a3d8ac1a3cd6b893f401
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 66312570A46288AEEB38CA68CC05BFA7BAEFF55330F04421AF081D21D1D37589C1C762
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • InternetReadFile.WININET(?,?,00000400,?), ref: 0082CE89
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,00000000), ref: 0082CEEA
                                                                                                                                                                                                                                                                                                                                                        • SetEvent.KERNEL32(?,?,00000000), ref: 0082CEFE
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 234945975-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 178b6b28b62f1882852aed5dcf1e4e69b92e8834a4f05b4c9d982a0236625ccb
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6f6587535dbbc486be53583dfd6afe318078846b70efbf08eff17e4576e6b68f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 178b6b28b62f1882852aed5dcf1e4e69b92e8834a4f05b4c9d982a0236625ccb
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9221BDB5500715EBDB20DFA5E948BAABBFCFB10358F10441EE546D2251EBB4EE84CB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 008182AA
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: lstrlen
                                                                                                                                                                                                                                                                                                                                                        • String ID: ($|
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1659193697-1631851259
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d6ae90395ee45484e27afbd9b5a1d75dd5731fabd0038ce3bcbf77aa9f396867
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5eaab2fcd789cc79e39935a399d08f09eba5375629fe6b5693ed5cfe750dcbfb
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d6ae90395ee45484e27afbd9b5a1d75dd5731fabd0038ce3bcbf77aa9f396867
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F2323674A00605DFC728CF59C481AAAB7F4FF48710B15C56EE59ADB3A1EB70E981CB40
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00825CC1
                                                                                                                                                                                                                                                                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00825D17
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(?), ref: 00825D5F
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3541575487-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 5feb721cd0d2887cc0e539f5560e984ec56bd50ed11870745d78fa531f533505
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6df17040c9e66a1c8680cb9c55f272c90e0555d0cbd79a566c0745b7dcbe5cce
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5feb721cd0d2887cc0e539f5560e984ec56bd50ed11870745d78fa531f533505
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B751A835600A019FC314CF28D498A9AB7E4FF09324F14856EE95ACB3A2DB30ED44CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • IsDebuggerPresent.KERNEL32 ref: 007E271A
                                                                                                                                                                                                                                                                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007E2724
                                                                                                                                                                                                                                                                                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 007E2731
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3906539128-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f68e90561578566727a515d9ac1b0daa53820a25b9be3f7011eae8c659cc66e2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5d86e878b77766ebb493418cda938315fa509f17597ee868deb348b428ef05e6
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f68e90561578566727a515d9ac1b0daa53820a25b9be3f7011eae8c659cc66e2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E731B5749112189BCB21DF65DC8979DB7B8BF08310F5051EAE41CA7261E7749F818F45
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 008251DA
                                                                                                                                                                                                                                                                                                                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00825238
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000000), ref: 008252A1
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1682464887-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2b0692dae3f1f9ce0686b25e9d852877d35d938df9b19c9199f5fa9b128b322b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c4de5d7ea6e1350daeb794baad217fa1f8004e41ff578703a452271caeb71127
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2b0692dae3f1f9ce0686b25e9d852877d35d938df9b19c9199f5fa9b128b322b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 59314C75A00618DFDB00DF54D888FADBBB4FF49314F188099E805AB3A2DB35E855CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007D0668
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007D0685
                                                                                                                                                                                                                                                                                                                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0081170D
                                                                                                                                                                                                                                                                                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0081173A
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 0081174A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 577356006-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0bfc823786314b777ad8f0ea81c1ae94f34fa848e9eab74611b62b67b861bd68
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: f7cd3a7242af2bcf2d2a55666ae5422cc402c3e67f6dbe3de8abae2f4addbac2
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0bfc823786314b777ad8f0ea81c1ae94f34fa848e9eab74611b62b67b861bd68
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 551191B2514309AFD7189F54DC8AEAAB7FDFF44714B20852EE05697291EB70BC81CA60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0081D608
                                                                                                                                                                                                                                                                                                                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0081D645
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0081D650
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 33631002-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 319d748bb5250c71a25b3e58894f324e38fe24736270b03d370dfbf4277e347b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: f3f2bb63242efa200f1e517f08d0b503c876247f0c0a7397c7dc75484ce963fd
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 319d748bb5250c71a25b3e58894f324e38fe24736270b03d370dfbf4277e347b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6D113C75E05228BBDB208F95AC45FAFBBBCFB45B50F108115F904E7290D6B05A058BA1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0081168C
                                                                                                                                                                                                                                                                                                                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 008116A1
                                                                                                                                                                                                                                                                                                                                                        • FreeSid.ADVAPI32(?), ref: 008116B1
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3429775523-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 94dff07213445ce5295e3b454c0b67d7a673cc707522e444821643eb7e9a5e2f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 08d28467e565838e88e6f329e6d717e97354cf708979bf115c6e85bb70eed289
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 94dff07213445ce5295e3b454c0b67d7a673cc707522e444821643eb7e9a5e2f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 03F0F475A51309FBDF00DFE49C89AAEBBBCFB08605F504965E501E2181E774AA448A54
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID: /
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-2043925204
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 97a8cb5fda1f528699f0efced1df946fd4cc518700aca505c859c49021cc4993
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 90f0f585f92183b0f94834e227ebc3523812ce1db67b3bbd9fc6fc702d91056b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 97a8cb5fda1f528699f0efced1df946fd4cc518700aca505c859c49021cc4993
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4041287A501259ABCB209FBACC4DDBB777CEB88314F1042A9F915D7280E6749D828B50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetUserNameW.ADVAPI32(?,?), ref: 0080D28C
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: NameUser
                                                                                                                                                                                                                                                                                                                                                        • String ID: X64
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2645101109-893830106
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8998da5bf2991af5f2767e73466c3d83431398e75e884cddccf48fd72909cc2b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: cc6a150767ee1976015c787b84510d26dad30c984967cd4fba8fc478e37ba1a9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8998da5bf2991af5f2767e73466c3d83431398e75e884cddccf48fd72909cc2b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6DD0C9B480211DEBCB90CB90DC88DD9B37CBB14305F100155F106E2040D77495488F10
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 887e2f7fe43384356b54a913814697f260e245b0739f1c841e5ba9d30cee4775
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 01022E72E0011A9FDF15CFA9C9806ADFBF1EF48314F25826AD919E7384D735A941CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00826918
                                                                                                                                                                                                                                                                                                                                                        • FindClose.KERNEL32(00000000), ref: 00826961
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2295610775-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d4008379dc71207df22c81a74ea5ca8931991878c9caed257a498b8bf5e93bb0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8d9f7b6728609dea5a29e02c43d6058468cee4ae1b73bef59749d778be6a30b3
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d4008379dc71207df22c81a74ea5ca8931991878c9caed257a498b8bf5e93bb0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6E11D0356042109FC710CF29D488A26BBE4FF85328F04C699F4698F2A2DB74EC85CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00834891,?,?,00000035,?), ref: 008237E4
                                                                                                                                                                                                                                                                                                                                                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00834891,?,?,00000035,?), ref: 008237F4
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3479602957-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: bf92905cec17bc47c5f5f396646061b3c8abd7085f8e20571bffa2964c115564
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0240b8c5be96d6e16e1d173495479ba12d2fcb4ac3bf872b37bc19bf9cff9491
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bf92905cec17bc47c5f5f396646061b3c8abd7085f8e20571bffa2964c115564
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8CF0E5B46052286BEB6017B69C4DFEB3AAEFFC5761F000275F609D2291D9A09944C6B0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0081B25D
                                                                                                                                                                                                                                                                                                                                                        • keybd_event.USER32(?,7608C0D0,?,00000000), ref: 0081B270
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: InputSendkeybd_event
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3536248340-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 5db047f0597291159f2de79dea8ca5d0c18c9bf2f3ff2f60f4c04fb9cef8336a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 7c6ee300b6d925419e4cad1608e8953ad65c99901dd41ff6ae06468f9a391c97
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5db047f0597291159f2de79dea8ca5d0c18c9bf2f3ff2f60f4c04fb9cef8336a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 44F01D7590424DABDB159FA4C805BEE7BB4FF05309F008009F955E6191C3798655DF94
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008111FC), ref: 008110D4
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?,?,008111FC), ref: 008110E9
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 81990902-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1ba3ff31cecf9d1658c94bcd02636192f710954a5620bb3fe03c1a04e479da63
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: da4ea6254f5ed1069c50aabcededfb4646f32e9f73926cff854c1498d39e5e1c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1ba3ff31cecf9d1658c94bcd02636192f710954a5620bb3fe03c1a04e479da63
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E1E0BF76115A10EEE7652F51FC09F7777ADFF05310B14882EF5A6804B1DB626C90DB50
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        • Variable is not of type 'Object'., xrefs: 00800C40
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID: Variable is not of type 'Object'.
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-1840281001
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0737545edb8471297625bae86863010f95fe8268c84d6ab0aac056d78fd80f44
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 24e2820227c6b8a1d3c4fdf88ff481ce9e6762616b0c1629da2b38e240bfb3cc
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0737545edb8471297625bae86863010f95fe8268c84d6ab0aac056d78fd80f44
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3C329C74A00218DFDF15DF94C895BEDBBB5FF05304F248069E806AB292DB79AE45CB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,007E6766,?,?,00000008,?,?,007EFEFE,00000000), ref: 007E6998
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ExceptionRaise
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3997070919-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 5ca036b4220c24f7424240c83599b118ca6fc22fbe4620ebff5dfae822c63a24
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3afdcb59fc3100b23658443fa656ca690f740d629dd42764941fd857d91f3ac1
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5ca036b4220c24f7424240c83599b118ca6fc22fbe4620ebff5dfae822c63a24
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B5B169716116488FD719CF29C48AB647BE0FF193A4F25C65CE899CF2A2C339E981CB40
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-3916222277
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a78dbb6819c49db2e9e7052a271377b9271305f6dbbce470e46382db87fa63f1
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 66cdfa7cca44f0f9bc7b66500fdac595c8993bcf01a90416ba66c63356266075
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a78dbb6819c49db2e9e7052a271377b9271305f6dbbce470e46382db87fa63f1
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F9123E71900229DFDB54CF58C881BEEB7B5FF48710F15819AE849EB295EB349A81CF90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • BlockInput.USER32(00000001), ref: 0082EABD
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: BlockInput
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3456056419-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: aa56408e5682c4cb4dbeaf8db820746673cd235f66a32d49cedb923d0559c82f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1dda23cd55a898d8b9141e4f57ee34f6e77e6bc6c0041d0528a3ea8aa1b0bc32
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: aa56408e5682c4cb4dbeaf8db820746673cd235f66a32d49cedb923d0559c82f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2EE012752002149FC710DF59D404E9AB7EDFF69760F00841AFC4AC7251D674A8408B91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,007D03EE), ref: 007D09DA
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3192549508-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: eddd58dab075fd5e131effaa5bc80b888fcc747710d51c99b6f562efa945445e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0ed1eb06eb66f68bd871d8577a5c3774b430488172c0f00202e36d148d87abaf
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: eddd58dab075fd5e131effaa5bc80b888fcc747710d51c99b6f562efa945445e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash:
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-4108050209
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 524fc1e03a5d6f68f95409f4f15ad6012ac6d82fca642812d005cce6c09e7a18
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E451677260C7459BDB3C856888AE7BE67B99B52300F18050BD886DB382F61DEE41E356
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: cf789f8af10a6d13a9d3ec2a9702d2ad4439d26ada26f9f74d990df3287c30cc
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ba2920f483475723c66805b7642280a74f2461043f9b3179ad6762511c073cda
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: cf789f8af10a6d13a9d3ec2a9702d2ad4439d26ada26f9f74d990df3287c30cc
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 05322322D2AF814DD7279635D8223356259BFBB3C6F14D737E81AB59A6EF2DC4838100
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 3fb6ebf565cb25174ace8702e73a4b02b6677d437b689461c7150179e2648bd8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fd448adea62279b9153319ff48474851b6d5eaa88ec86510d29cbf7b4d251a43
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3fb6ebf565cb25174ace8702e73a4b02b6677d437b689461c7150179e2648bd8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 51320232A041198BDF79CF29C894B7D7BA1FB45314F28826ED89ACB2D1D234DD81DB51
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8aeb4cb484c74cd8912fd8b9c591cc72f195865fd77bfcc25227005c5fcd8b0f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: da360f733b950ba6777d4032e7b28461b65de1e4ef6be1d49fea559222a024f3
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8aeb4cb484c74cd8912fd8b9c591cc72f195865fd77bfcc25227005c5fcd8b0f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8A228EB0A04609DFDF14DF68D885BEEB7B6FF44300F204529E916AB391EB39A951CB50
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 18bbafeb9d7dfa58759e661306fbe5aa0b4c714ca6fed5a8655b38da632b2119
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 477fbd10c624b78aaea92dedf39f93e414dec230005efe4a9c4e0056ba7d6ba4
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 18bbafeb9d7dfa58759e661306fbe5aa0b4c714ca6fed5a8655b38da632b2119
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1E02A7B1E00209EBDB14DF64D885BBDB7B5FF44300F108169EA169B3A1EB39DA50DB91
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: fcf81f42ef7b0397818b8064c40af0fdcf99f19b227230f2396317225a808119
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 9369cbbd8c18c3eef5974c26225465263018a679ea9a2286a9b3b2376b0af720
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fcf81f42ef7b0397818b8064c40af0fdcf99f19b227230f2396317225a808119
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 31B1F020D2AF414DC62396399831336B75CBFBB6D6F91D31BFC2674E22EB2686834140
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ad58c1e606bf26f58a887eac6606d20549147af21a86469759dc06de5e240761
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B79176722090E35ADB29463E857403EFFF15A923A235A079FD4F2CA3C5FE28D954D620
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8f2028f9bc27fce677bd02f5cf124f41e5b8e23481cceb1df10d1fc05fd0e4d0
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0E9169722090E349DB6D4339857403DFFF15AA23A131A479FE4F2CB2C6EE29D556D620
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ab9bc2a21a5880f6d25682787912b68eecbb869972b73ae910fe2b26a87cdbd3
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B89154722090E35ADB2D427A857403EFFF15A923A239A479FD4F2CA2C5FE28D554D620
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f7254075197c6e3f3e73751c42fe2aa758b471049a743cdbfcae28d361e71a25
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 62142cea7ef744e1fbfd2ac3c34bec2f5e6f6d0a64d72cc962736b87afec309a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f7254075197c6e3f3e73751c42fe2aa758b471049a743cdbfcae28d361e71a25
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 44614BB120874996DA3C5A2C8D96BBE23B8DF81700F14491FE846DB381F61DDE42C366
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: dce13b0d871eef399c94097beece11b31ebd49e1a40d3b04c283d1cab66b3997
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 7b32e13d9d46272207342d8e12e924cb833b0b7b50492969595cfd25d5115b8d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: dce13b0d871eef399c94097beece11b31ebd49e1a40d3b04c283d1cab66b3997
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 39616A7170870996DE3C4A288896BBF63B6DF42704F14095BE983DB381FA1EED42C256
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 893de2ce9f4573d324b55c64d80b79c86ea1fd9f15ab7398311d744167746b4a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F78163726090E319EB6D827A853443EFFF15A923B135A079FD4F2CA2D1EE289554E620
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 06113e9d275bb668a73157ddaa1f1c24ed544c7273796778d8a9c7839bba3a06
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3f57fcf30c17d3eedcbaa1ce4a44b30b1f8cd67a3bdae20d0beae84e3e6f6985
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 06113e9d275bb668a73157ddaa1f1c24ed544c7273796778d8a9c7839bba3a06
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D621A8326206218BD728CE79C81267A73E5FB64310F15862EE4A7C77D0DE35A944CB40
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 00832B30
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 00832B43
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32 ref: 00832B52
                                                                                                                                                                                                                                                                                                                                                        • GetDesktopWindow.USER32 ref: 00832B6D
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000), ref: 00832B74
                                                                                                                                                                                                                                                                                                                                                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00832CA3
                                                                                                                                                                                                                                                                                                                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00832CB1
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832CF8
                                                                                                                                                                                                                                                                                                                                                        • GetClientRect.USER32(00000000,?), ref: 00832D04
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00832D40
                                                                                                                                                                                                                                                                                                                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832D62
                                                                                                                                                                                                                                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832D75
                                                                                                                                                                                                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832D80
                                                                                                                                                                                                                                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 00832D89
                                                                                                                                                                                                                                                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832D98
                                                                                                                                                                                                                                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00832DA1
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832DA8
                                                                                                                                                                                                                                                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00832DB3
                                                                                                                                                                                                                                                                                                                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832DC5
                                                                                                                                                                                                                                                                                                                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,0084FC38,00000000), ref: 00832DDB
                                                                                                                                                                                                                                                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00832DEB
                                                                                                                                                                                                                                                                                                                                                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00832E11
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00832E30
                                                                                                                                                                                                                                                                                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00832E52
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0083303F
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                                                                                                                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2a1f81974851d170d5cb5ae9df6e1c74a47469bf538cd2e2d4c790d7e437515e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: de225b8e1bb19c54a2fe0a37a6454395ce4765346d593baaa9a1e32bbebf032e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2a1f81974851d170d5cb5ae9df6e1c74a47469bf538cd2e2d4c790d7e437515e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 64024975500218EFDB24DF68CC89EAE7BB9FF49710F048558F915EB2A1DB74A901CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetTextColor.GDI32(?,00000000), ref: 0084712F
                                                                                                                                                                                                                                                                                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 00847160
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(0000000F), ref: 0084716C
                                                                                                                                                                                                                                                                                                                                                        • SetBkColor.GDI32(?,000000FF), ref: 00847186
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(?,?), ref: 00847195
                                                                                                                                                                                                                                                                                                                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 008471C0
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(00000010), ref: 008471C8
                                                                                                                                                                                                                                                                                                                                                        • CreateSolidBrush.GDI32(00000000), ref: 008471CF
                                                                                                                                                                                                                                                                                                                                                        • FrameRect.USER32(?,?,00000000), ref: 008471DE
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 008471E5
                                                                                                                                                                                                                                                                                                                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00847230
                                                                                                                                                                                                                                                                                                                                                        • FillRect.USER32(?,?,?), ref: 00847262
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00847284
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: GetSysColor.USER32(00000012), ref: 00847421
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: SetTextColor.GDI32(?,?), ref: 00847425
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: GetSysColorBrush.USER32(0000000F), ref: 0084743B
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: GetSysColor.USER32(0000000F), ref: 00847446
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: GetSysColor.USER32(00000011), ref: 00847463
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00847471
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: SelectObject.GDI32(?,00000000), ref: 00847482
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: SetBkColor.GDI32(?,00000000), ref: 0084748B
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: SelectObject.GDI32(?,?), ref: 00847498
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008474B7
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008474CE
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008473E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008474DB
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4124339563-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 40f3e2d10ca46a2082de8d269cf207c25a1152f3e8708751a91af3fe8a954914
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 765c7c820242e0881352ec17fa747d780afdc7684f34830b6d3cf1ea659bc5ac
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 40f3e2d10ca46a2082de8d269cf207c25a1152f3e8708751a91af3fe8a954914
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 23A1AF76009315AFDB509F64DC48E6BBBA9FF8A320F100A19F962E61E1D770E944CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(?,?), ref: 007C8E14
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00806AC5
                                                                                                                                                                                                                                                                                                                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00806AFE
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00806F43
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007C8BE8,?,00000000,?,?,?,?,007C8BBA,00000000,?), ref: 007C8FC5
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001053), ref: 00806F7F
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00806F96
                                                                                                                                                                                                                                                                                                                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00806FAC
                                                                                                                                                                                                                                                                                                                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00806FB7
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d719e92253906da0e560665713dace305ba87b8fcdd02875513b461ea5d46841
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 7f3433964298a26378854a6256eb689d9390172b6443fa529c02fe2b8930344c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d719e92253906da0e560665713dace305ba87b8fcdd02875513b461ea5d46841
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9912AC34201211DFDBA5CF28CC58BA9BBE5FF45310F54446DE495CB2A2DB35E862CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(00000000), ref: 0083273E
                                                                                                                                                                                                                                                                                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0083286A
                                                                                                                                                                                                                                                                                                                                                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008328A9
                                                                                                                                                                                                                                                                                                                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008328B9
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00832900
                                                                                                                                                                                                                                                                                                                                                        • GetClientRect.USER32(00000000,?), ref: 0083290C
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00832955
                                                                                                                                                                                                                                                                                                                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00832964
                                                                                                                                                                                                                                                                                                                                                        • GetStockObject.GDI32(00000011), ref: 00832974
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00832978
                                                                                                                                                                                                                                                                                                                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00832988
                                                                                                                                                                                                                                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00832991
                                                                                                                                                                                                                                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 0083299A
                                                                                                                                                                                                                                                                                                                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008329C6
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 008329DD
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00832A1D
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00832A31
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00832A42
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00832A77
                                                                                                                                                                                                                                                                                                                                                        • GetStockObject.GDI32(00000011), ref: 00832A82
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00832A8D
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00832A97
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                                                                                                                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2910397461-517079104
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 42f6ab8db8f57951d15bfa8142149586d7703f832eb4af3d780732a282b74bc1
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e3b379803e14e7dd318039e1bb2d1dc92b6d133347857f5bce554b731aef1237
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 42f6ab8db8f57951d15bfa8142149586d7703f832eb4af3d780732a282b74bc1
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F3B16C75A00219AFEB14DFA8CC4AFAE7BA9FB48714F008514F915E7290DB74ED40CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 00824AED
                                                                                                                                                                                                                                                                                                                                                        • GetDriveTypeW.KERNEL32(?,0084CB68,?,\\.\,0084CC08), ref: 00824BCA
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000000,0084CB68,?,\\.\,0084CC08), ref: 00824D36
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                                                                                                                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 57628564f60d5b832ac0b273d8f380e5ed4549c85789049cedcb031ef6817ec2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 71ac7bcd1eace9da5b23383f833b7ba123e9ec81be9bf7a821a97e2da5ada5ee
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 57628564f60d5b832ac0b273d8f380e5ed4549c85789049cedcb031ef6817ec2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CE610630601619DBCB14DF68DA85DAC7BA0FF44304B249016F81AEB396EB3ADDD1DB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(00000012), ref: 00847421
                                                                                                                                                                                                                                                                                                                                                        • SetTextColor.GDI32(?,?), ref: 00847425
                                                                                                                                                                                                                                                                                                                                                        • GetSysColorBrush.USER32(0000000F), ref: 0084743B
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(0000000F), ref: 00847446
                                                                                                                                                                                                                                                                                                                                                        • CreateSolidBrush.GDI32(?), ref: 0084744B
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(00000011), ref: 00847463
                                                                                                                                                                                                                                                                                                                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00847471
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(?,00000000), ref: 00847482
                                                                                                                                                                                                                                                                                                                                                        • SetBkColor.GDI32(?,00000000), ref: 0084748B
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(?,?), ref: 00847498
                                                                                                                                                                                                                                                                                                                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 008474B7
                                                                                                                                                                                                                                                                                                                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008474CE
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 008474DB
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0084752A
                                                                                                                                                                                                                                                                                                                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00847554
                                                                                                                                                                                                                                                                                                                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00847572
                                                                                                                                                                                                                                                                                                                                                        • DrawFocusRect.USER32(?,?), ref: 0084757D
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(00000011), ref: 0084758E
                                                                                                                                                                                                                                                                                                                                                        • SetTextColor.GDI32(?,00000000), ref: 00847596
                                                                                                                                                                                                                                                                                                                                                        • DrawTextW.USER32(?,008470F5,000000FF,?,00000000), ref: 008475A8
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(?,?), ref: 008475BF
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32(?), ref: 008475CA
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(?,?), ref: 008475D0
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32(?), ref: 008475D5
                                                                                                                                                                                                                                                                                                                                                        • SetTextColor.GDI32(?,?), ref: 008475DB
                                                                                                                                                                                                                                                                                                                                                        • SetBkColor.GDI32(?,?), ref: 008475E5
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1996641542-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9550b5c939254cfb13fab4f009185e3c85d88a6582407e6b729ce8ae5a0ef8c5
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: d6224014a002ad7f0ff79dc7d5a2697c23b377326337c4872d921a66a2239604
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9550b5c939254cfb13fab4f009185e3c85d88a6582407e6b729ce8ae5a0ef8c5
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 35616A76901218AFDF119FA4DC49EAEBFB9FB09320F118115F915BB2A1D7749940CF90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCursorPos.USER32(?), ref: 00841128
                                                                                                                                                                                                                                                                                                                                                        • GetDesktopWindow.USER32 ref: 0084113D
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000), ref: 00841144
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00841199
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(?), ref: 008411B9
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008411ED
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0084120B
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0084121D
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00841232
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00841245
                                                                                                                                                                                                                                                                                                                                                        • IsWindowVisible.USER32(00000000), ref: 008412A1
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008412BC
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008412D0
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 008412E8
                                                                                                                                                                                                                                                                                                                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 0084130E
                                                                                                                                                                                                                                                                                                                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00841328
                                                                                                                                                                                                                                                                                                                                                        • CopyRect.USER32(?,?), ref: 0084133F
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 008413AA
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                                                                                                                                                        • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 698492251-4156429822
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e8857675b455bb798727b58c8232ad6253c871286ebdd2fc2f01579275611c4e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e02ff8c16b9035c6c8926b66873e34a28ab9ef6b6d0ff0dfadcbe4f19a749648
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e8857675b455bb798727b58c8232ad6253c871286ebdd2fc2f01579275611c4e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2AB17D71604345AFDB54DF64C888BAABBE4FF89354F00891CF999DB261C771E844CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CharUpperBuffW.USER32(?,?), ref: 008402E5
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0084031F
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00840389
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008403F1
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00840475
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 008404C5
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00840504
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CF9F2: _wcslen.LIBCMT ref: 007CF9FD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00812258
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0081228A
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1103490817-719923060
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0c77f1ec16626db46d39dfa7ef841675eadc44cf090e831cc32f441a830e8bb0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: eeb08a53e9890ce45b02ee31edccf8e2aa417ce4de9e137c7c3b88020395a09d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0c77f1ec16626db46d39dfa7ef841675eadc44cf090e831cc32f441a830e8bb0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 00E1AB312082098BC724DF24C45096BB7E6FFD8318B15895CFA96EB3A5DB34ED45CB82
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007C8968
                                                                                                                                                                                                                                                                                                                                                        • GetSystemMetrics.USER32(00000007), ref: 007C8970
                                                                                                                                                                                                                                                                                                                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007C899B
                                                                                                                                                                                                                                                                                                                                                        • GetSystemMetrics.USER32(00000008), ref: 007C89A3
                                                                                                                                                                                                                                                                                                                                                        • GetSystemMetrics.USER32(00000004), ref: 007C89C8
                                                                                                                                                                                                                                                                                                                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007C89E5
                                                                                                                                                                                                                                                                                                                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007C89F5
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 007C8A28
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 007C8A3C
                                                                                                                                                                                                                                                                                                                                                        • GetClientRect.USER32(00000000,000000FF), ref: 007C8A5A
                                                                                                                                                                                                                                                                                                                                                        • GetStockObject.GDI32(00000011), ref: 007C8A76
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 007C8A81
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C912D: GetCursorPos.USER32(?), ref: 007C9141
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C912D: ScreenToClient.USER32(00000000,?), ref: 007C915E
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C912D: GetAsyncKeyState.USER32(00000001), ref: 007C9183
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C912D: GetAsyncKeyState.USER32(00000002), ref: 007C919D
                                                                                                                                                                                                                                                                                                                                                        • SetTimer.USER32(00000000,00000000,00000028,007C90FC), ref: 007C8AA8
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                                                                                                                                                        • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1458621304-248962490
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 21bad5887a6951e8a429dd5ee04059b893e63cdd167a6a8df35df2c513903126
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8293708309932ccce6a3c8c1b09fbdbb734a17a459b3c0ef6f2d911d929b5645
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 21bad5887a6951e8a429dd5ee04059b893e63cdd167a6a8df35df2c513903126
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8FB18A75A0020AAFDF54DFA8CC49BAE7BB9FB48314F11422DFA15E7290DB34A851CB51
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00811114
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811120
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 0081112F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811136
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0081114D
                                                                                                                                                                                                                                                                                                                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00810DF5
                                                                                                                                                                                                                                                                                                                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00810E29
                                                                                                                                                                                                                                                                                                                                                        • GetLengthSid.ADVAPI32(?), ref: 00810E40
                                                                                                                                                                                                                                                                                                                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00810E7A
                                                                                                                                                                                                                                                                                                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00810E96
                                                                                                                                                                                                                                                                                                                                                        • GetLengthSid.ADVAPI32(?), ref: 00810EAD
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00810EB5
                                                                                                                                                                                                                                                                                                                                                        • HeapAlloc.KERNEL32(00000000), ref: 00810EBC
                                                                                                                                                                                                                                                                                                                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00810EDD
                                                                                                                                                                                                                                                                                                                                                        • CopySid.ADVAPI32(00000000), ref: 00810EE4
                                                                                                                                                                                                                                                                                                                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00810F13
                                                                                                                                                                                                                                                                                                                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00810F35
                                                                                                                                                                                                                                                                                                                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00810F47
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810F6E
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 00810F75
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810F7E
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 00810F85
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00810F8E
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 00810F95
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00810FA1
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 00810FA8
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811193: GetProcessHeap.KERNEL32(00000008,00810BB1,?,00000000,?,00810BB1,?), ref: 008111A1
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00810BB1,?), ref: 008111A8
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00810BB1,?), ref: 008111B7
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4175595110-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 337e1eb813370e709417c086be5436925f92dabeff2125b56a97aef522fb7571
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 30cb46ac7d96d2665850688efda8f31fb9d5c29f5f0e013e73940b53b491ce77
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 337e1eb813370e709417c086be5436925f92dabeff2125b56a97aef522fb7571
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9171487690120AABDB209FA5DC49BEEBBBCFF05300F044115E959E6191DB719A86CF60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083C4BD
                                                                                                                                                                                                                                                                                                                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,0084CC08,00000000,?,00000000,?,?), ref: 0083C544
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0083C5A4
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0083C5F4
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0083C66F
                                                                                                                                                                                                                                                                                                                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0083C6B2
                                                                                                                                                                                                                                                                                                                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0083C7C1
                                                                                                                                                                                                                                                                                                                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0083C84D
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0083C881
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0083C88E
                                                                                                                                                                                                                                                                                                                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0083C960
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                                                                                                                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 9721498-966354055
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 297d0205f2057c368ca31631e4f9c8ac9832172233db467755d683ce83eb5c3b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 19cc5cd4c630f8493a62c4cc936dd02d9bf427eabe57c65402344910b4ec52a5
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 297d0205f2057c368ca31631e4f9c8ac9832172233db467755d683ce83eb5c3b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5B123435604201DFCB14DF14C885B6AB7E5FF88714F14889DF89AAB2A2DB35ED41CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CharUpperBuffW.USER32(?,?), ref: 008409C6
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00840A01
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00840A54
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00840A8A
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00840B06
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00840B81
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CF9F2: _wcslen.LIBCMT ref: 007CF9FD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00812BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00812BFA
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 11f5358184063a390b88f9988477ef12a53897d931eaff3219dbe8da420ec9e1
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 55e4d8eb6a3f4d9bfca4a3d644c7bafdb43ed57f86d5de9b5f2341458b66eb6f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 11f5358184063a390b88f9988477ef12a53897d931eaff3219dbe8da420ec9e1
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 10E17831608305DFC714DF24C491A6AB7E2FF98318B14895DF99A9B3A2D734ED49CB82
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1256254125-909552448
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 92ce81ddef22ef537d01200543781dbcbe4baa0aa70c0791b8ac7876f10f9fe2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 9ca86d202b339990f141ed305aa969b5fbfacdef98adffa7c22e863867014045
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 92ce81ddef22ef537d01200543781dbcbe4baa0aa70c0791b8ac7876f10f9fe2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7271D37260012A8BCB20DE7CCD516BA73A5FBE0764F254529F866F7284EA35DD45C3E0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0084835A
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0084836E
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00848391
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008483B4
                                                                                                                                                                                                                                                                                                                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008483F2
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00845BF2), ref: 0084844E
                                                                                                                                                                                                                                                                                                                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00848487
                                                                                                                                                                                                                                                                                                                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008484CA
                                                                                                                                                                                                                                                                                                                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00848501
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(?), ref: 0084850D
                                                                                                                                                                                                                                                                                                                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0084851D
                                                                                                                                                                                                                                                                                                                                                        • DestroyIcon.USER32(?,?,?,?,?,00845BF2), ref: 0084852C
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00848549
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00848555
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                                                                                                                                                        • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 799131459-1154884017
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 15f317537bd7df392fba25ab743e63f6cfd9526fcd82a442900d44ee0b921287
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0755e91b7ab20ab911b55309e3dc2967c8d10a9aec67aeb3ad187cb982899be9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 15f317537bd7df392fba25ab743e63f6cfd9526fcd82a442900d44ee0b921287
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B961AF71900219FBEB14DF64CC85BBE77ACFB04B11F10454AF915E61D1DB74AA90CBA0
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-1645009161
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1ed8306e6214df338f367dc9f1b98cc7345ed93b7ee3c4ccad7319e08a9c815a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e9ae8844307ff727b0ea56be9e59a88c66f851b101d7ba9b43d039a3d3b105c7
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1ed8306e6214df338f367dc9f1b98cc7345ed93b7ee3c4ccad7319e08a9c815a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BB81C371A04609FBDB24AF60CC46FFE37A9FF55300F044025FA15AA296EB7CD911D6A1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CharLowerBuffW.USER32(?,?), ref: 00823EF8
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00823F03
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00823F5A
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00823F98
                                                                                                                                                                                                                                                                                                                                                        • GetDriveTypeW.KERNEL32(?), ref: 00823FD6
                                                                                                                                                                                                                                                                                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0082401E
                                                                                                                                                                                                                                                                                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00824059
                                                                                                                                                                                                                                                                                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00824087
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                                                                                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7a8d00cfb8414bf816bfec0c31da590350dd89975edab9292cd904dbeb019244
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e5fc2d533d9e1a16cf615f241f11eb5dadedea36d0b3f5ddcfd437aafe71a33b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7a8d00cfb8414bf816bfec0c31da590350dd89975edab9292cd904dbeb019244
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 267101326046119FC310EF24D8909AAB7F4FF94758F10892DF9A5D7251EB38ED89CB51
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadIconW.USER32(00000063), ref: 00815A2E
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00815A40
                                                                                                                                                                                                                                                                                                                                                        • SetWindowTextW.USER32(?,?), ref: 00815A57
                                                                                                                                                                                                                                                                                                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00815A6C
                                                                                                                                                                                                                                                                                                                                                        • SetWindowTextW.USER32(00000000,?), ref: 00815A72
                                                                                                                                                                                                                                                                                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00815A82
                                                                                                                                                                                                                                                                                                                                                        • SetWindowTextW.USER32(00000000,?), ref: 00815A88
                                                                                                                                                                                                                                                                                                                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00815AA9
                                                                                                                                                                                                                                                                                                                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00815AC3
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00815ACC
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00815B33
                                                                                                                                                                                                                                                                                                                                                        • SetWindowTextW.USER32(?,?), ref: 00815B6F
                                                                                                                                                                                                                                                                                                                                                        • GetDesktopWindow.USER32 ref: 00815B75
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000), ref: 00815B7C
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00815BD3
                                                                                                                                                                                                                                                                                                                                                        • GetClientRect.USER32(?,?), ref: 00815BE0
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00815C05
                                                                                                                                                                                                                                                                                                                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00815C2F
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 895679908-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1a4674c344b2de4132d1e20a0fb70f2298fdfeca4356c1a6e65832bbdb7ad9df
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 18d71799e6ad14f13930a64823c0960bdc378615cc513ea4a99d52609d6a2055
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1a4674c344b2de4132d1e20a0fb70f2298fdfeca4356c1a6e65832bbdb7ad9df
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F2716F31900B09EFDB20DFA9CE85AAEBBF9FF88714F104519E542E25A0D775E984CB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 0082FE27
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 0082FE32
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 0082FE3D
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 0082FE48
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 0082FE53
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 0082FE5E
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F81), ref: 0082FE69
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 0082FE74
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F80), ref: 0082FE7F
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 0082FE8A
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 0082FE95
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 0082FEA0
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 0082FEAB
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 0082FEB6
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 0082FEC1
                                                                                                                                                                                                                                                                                                                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 0082FECC
                                                                                                                                                                                                                                                                                                                                                        • GetCursorInfo.USER32(?), ref: 0082FEDC
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 0082FF1E
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3215588206-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2b9e669b75deb0085c38591913aa42ca1d423837d60f74dd56c4adf797f351cc
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 043c68343e12d85225fac4952fd7b9c99572e6c9bdcfe6e916b6ec6e18499a0f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2b9e669b75deb0085c38591913aa42ca1d423837d60f74dd56c4adf797f351cc
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 314160B0D04319AADB109FBA9C8985EBFF8FF04354B50853AF119E7281DB78A941CE90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 007D00C6
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0088070C,00000FA0,EAA3E3AD,?,?,?,?,007F23B3,000000FF), ref: 007D011C
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,007F23B3,000000FF), ref: 007D0127
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,007F23B3,000000FF), ref: 007D0138
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 007D014E
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 007D015C
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 007D016A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007D0195
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007D01A0
                                                                                                                                                                                                                                                                                                                                                        • ___scrt_fastfail.LIBCMT ref: 007D00E7
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00A3: __onexit.LIBCMT ref: 007D00A9
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        • WakeAllConditionVariable, xrefs: 007D0162
                                                                                                                                                                                                                                                                                                                                                        • InitializeConditionVariable, xrefs: 007D0148
                                                                                                                                                                                                                                                                                                                                                        • SleepConditionVariableCS, xrefs: 007D0154
                                                                                                                                                                                                                                                                                                                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 007D0122
                                                                                                                                                                                                                                                                                                                                                        • kernel32.dll, xrefs: 007D0133
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                                                                                                                                                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 66158676-1714406822
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: fb5fc22f96e3cff6248dc2f0653c1cb4342d459d20ec6aaee3f4f9b64ae1e7d8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5c245c9f306993479fbfc1a9d13b205c66e4fc8408f9863c02985868cfb002ab
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fb5fc22f96e3cff6248dc2f0653c1cb4342d459d20ec6aaee3f4f9b64ae1e7d8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0D21C636A45719ABE7506BA4AC09B6E77E8FB05B51F10013FF911E3392DB7E98008AD0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 176396367-1603158881
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a8137b3f5c9445f4494a8947a0c393c5cd25e3b5b73f82fe5e319595d5c56ef2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0fedceb0302cbd488bfd94d1c42bd4f4bd7e2ba3d28bf9bbc2925dd844819846
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a8137b3f5c9445f4494a8947a0c393c5cd25e3b5b73f82fe5e319595d5c56ef2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 63E1E432A00516EBCB189FA8C455BEDFBB9FF54710F54812AE566F7240DB30AEC98790
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CharLowerBuffW.USER32(00000000,00000000,0084CC08), ref: 00824527
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0082453B
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00824599
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008245F4
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0082463F
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008246A7
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CF9F2: _wcslen.LIBCMT ref: 007CF9FD
                                                                                                                                                                                                                                                                                                                                                        • GetDriveTypeW.KERNEL32(?,00876BF0,00000061), ref: 00824743
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                                                                                                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0ce5cbb06bdf287ad6008cb94fe77b48c7af531ac44dd64504502d91b3904ddb
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a922b0521a8c074d8b507d955d448b3b9ffd4edd28cf4bebd4f6f4dab113efae
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0ce5cbb06bdf287ad6008cb94fe77b48c7af531ac44dd64504502d91b3904ddb
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A1B112316083229FC710DF28E890A6EB7E5FFA5724F50591DF5AAC7291E734D884CB62
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,0084CC08), ref: 008340BB
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 008340CD
                                                                                                                                                                                                                                                                                                                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0084CC08), ref: 008340F2
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,0084CC08), ref: 0083413E
                                                                                                                                                                                                                                                                                                                                                        • StringFromGUID2.OLE32(?,?,00000028,?,0084CC08), ref: 008341A8
                                                                                                                                                                                                                                                                                                                                                        • SysFreeString.OLEAUT32(00000009), ref: 00834262
                                                                                                                                                                                                                                                                                                                                                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 008342C8
                                                                                                                                                                                                                                                                                                                                                        • SysFreeString.OLEAUT32(?), ref: 008342F2
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                                                                                                                                                        • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 354098117-199464113
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4ed91841bbe92b514f4a2b006addf9b61e4f5ddff4ae81c5fd90b4b6d43f5d87
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2e4ae6a385866f397824fe749e10ef71288891ceeec14c517b0fd55e8b81d250
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4ed91841bbe92b514f4a2b006addf9b61e4f5ddff4ae81c5fd90b4b6d43f5d87
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 99122D75A00119EFDB14CF94C884EAEBBB9FF85318F248098E905EB251D731ED46CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemCount.USER32(00881990), ref: 007F2F8D
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemCount.USER32(00881990), ref: 007F303D
                                                                                                                                                                                                                                                                                                                                                        • GetCursorPos.USER32(?), ref: 007F3081
                                                                                                                                                                                                                                                                                                                                                        • SetForegroundWindow.USER32(00000000), ref: 007F308A
                                                                                                                                                                                                                                                                                                                                                        • TrackPopupMenuEx.USER32(00881990,00000000,?,00000000,00000000,00000000), ref: 007F309D
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007F30A9
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 36266755-4108050209
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a1d8b536b3ab54fa66dde813e5c94c6697b7b97fd18966722f5b4b625007b585
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ce8344698765f5ab8dfbc8e13e75fc09c1031beeb5a925525f7bfb7b9b137017
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a1d8b536b3ab54fa66dde813e5c94c6697b7b97fd18966722f5b4b625007b585
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B5712D70644209BEEB218F64CC49FEABF69FF05324F204216F615A62D1C7B9AD50DB51
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(00000000,?), ref: 00846DEB
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00846E5F
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00846E81
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00846E94
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(?), ref: 00846EB5
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,007B0000,00000000), ref: 00846EE4
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00846EFD
                                                                                                                                                                                                                                                                                                                                                        • GetDesktopWindow.USER32 ref: 00846F16
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000), ref: 00846F1D
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00846F35
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00846F4D
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9944: GetWindowLongW.USER32(?,000000EB), ref: 007C9952
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0$tooltips_class32
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7324067461c5b0abb4bd5c1edd98fc0aea3392cecda6757137138d198a0764fa
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 59fbb75dd60c66bc5a3a352b1f24904d8d8c8462b208c094b4b13a2d77133f45
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7324067461c5b0abb4bd5c1edd98fc0aea3392cecda6757137138d198a0764fa
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9A714674104348AFDB61CF18DC48BAABBE9FB8A304F54441DF999C7261DB74A91ACB12
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                        • DragQueryPoint.SHELL32(?,?), ref: 00849147
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00847674: ClientToScreen.USER32(?,?), ref: 0084769A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00847674: GetWindowRect.USER32(?,?), ref: 00847710
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00847674: PtInRect.USER32(?,?,00848B89), ref: 00847720
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 008491B0
                                                                                                                                                                                                                                                                                                                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008491BB
                                                                                                                                                                                                                                                                                                                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008491DE
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00849225
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0084923E
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00849255
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00849277
                                                                                                                                                                                                                                                                                                                                                        • DragFinish.SHELL32(?), ref: 0084927E
                                                                                                                                                                                                                                                                                                                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00849371
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                                                                                                                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 221274066-3440237614
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 73234da629cbd78eb70dcfc152f34a4d3252928702f820598f720f00c8b5ca71
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bdbbfa59c9f06e861bfc0e85633b40ae4c7a2a46a3a1954221d2fa731e0e9048
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 73234da629cbd78eb70dcfc152f34a4d3252928702f820598f720f00c8b5ca71
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 07617C71108305AFD701EF64DC89EAFBBE8FF89350F40491DF6A5922A1DB709A49CB52
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0082C4B0
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0082C4C3
                                                                                                                                                                                                                                                                                                                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0082C4D7
                                                                                                                                                                                                                                                                                                                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0082C4F0
                                                                                                                                                                                                                                                                                                                                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0082C533
                                                                                                                                                                                                                                                                                                                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0082C549
                                                                                                                                                                                                                                                                                                                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0082C554
                                                                                                                                                                                                                                                                                                                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0082C584
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0082C5DC
                                                                                                                                                                                                                                                                                                                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0082C5F0
                                                                                                                                                                                                                                                                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 0082C5FB
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f298dea88832a5e65c1a29458ebb40c6e3ff002fd90ea0b71bd33c0f4f6d804e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c652945e43e4d41af07cab9cdc426af269a9cc61754e98b66f1b20f1297b3179
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f298dea88832a5e65c1a29458ebb40c6e3ff002fd90ea0b71bd33c0f4f6d804e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4D5158B4500618AFEB219F64DA88ABB7BFCFF09344F00441AF945D6250DB74E984DB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00848592
                                                                                                                                                                                                                                                                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485A2
                                                                                                                                                                                                                                                                                                                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485AD
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485BA
                                                                                                                                                                                                                                                                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 008485C8
                                                                                                                                                                                                                                                                                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485D7
                                                                                                                                                                                                                                                                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 008485E0
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485E7
                                                                                                                                                                                                                                                                                                                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 008485F8
                                                                                                                                                                                                                                                                                                                                                        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0084FC38,?), ref: 00848611
                                                                                                                                                                                                                                                                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00848621
                                                                                                                                                                                                                                                                                                                                                        • GetObjectW.GDI32(?,00000018,?), ref: 00848641
                                                                                                                                                                                                                                                                                                                                                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00848671
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32(?), ref: 00848699
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008486AF
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3840717409-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6e08ea6f6a589543d07bbed1e3c1eb075cffe3d2ea23c9687765bea4b09db686
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 7da7ef7db1ef7a90081bfab9c8421dccd1309b2c1413ec2e677ef774535f6a14
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6e08ea6f6a589543d07bbed1e3c1eb075cffe3d2ea23c9687765bea4b09db686
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D8412979601208EFDB519FA5CC48EAE7BBCFF9A715F118058F909E7260DB749901DB20
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(00000000), ref: 00821502
                                                                                                                                                                                                                                                                                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 0082150B
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 00821517
                                                                                                                                                                                                                                                                                                                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 008215FB
                                                                                                                                                                                                                                                                                                                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00821657
                                                                                                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 00821708
                                                                                                                                                                                                                                                                                                                                                        • SysFreeString.OLEAUT32(?), ref: 0082178C
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 008217D8
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 008217E7
                                                                                                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(00000000), ref: 00821823
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                                                                                                                                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1234038744-3931177956
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d27d66d1397570efa1b24bb300897270d60de9aee44f815f873a66d03a141748
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 15a55445df01e1e8f38bac0e7d42cfb47e89e0e35077e7c34c292fe008193826
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d27d66d1397570efa1b24bb300897270d60de9aee44f815f873a66d03a141748
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4CD1CF71A00229EBDF109F65E98DBB9B7B5FF55704F24809AE406EB180DB34EC81DB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0083B6AE,?,?), ref: 0083C9B5
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083C9F1
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA68
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA9E
                                                                                                                                                                                                                                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083B6F4
                                                                                                                                                                                                                                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0083B772
                                                                                                                                                                                                                                                                                                                                                        • RegDeleteValueW.ADVAPI32(?,?), ref: 0083B80A
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0083B87E
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0083B89C
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0083B8F2
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0083B904
                                                                                                                                                                                                                                                                                                                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0083B922
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 0083B983
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0083B994
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                                                                                                                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 146587525-4033151799
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a54c3aa904fc45b99503c02276fc718fba4217feda7901b5a0ce10c95142ad81
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 30513ba37bd3a0391948f638cf2344f51ef3e724e4cb0e6172822ab24584d91f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a54c3aa904fc45b99503c02276fc718fba4217feda7901b5a0ce10c95142ad81
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 03C17A75208201EFD710DF14C499B6ABBE5FF84318F18849CF69A8B2A2DB35ED45CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetDC.USER32(00000000), ref: 008325D8
                                                                                                                                                                                                                                                                                                                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008325E8
                                                                                                                                                                                                                                                                                                                                                        • CreateCompatibleDC.GDI32(?), ref: 008325F4
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(00000000,?), ref: 00832601
                                                                                                                                                                                                                                                                                                                                                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0083266D
                                                                                                                                                                                                                                                                                                                                                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008326AC
                                                                                                                                                                                                                                                                                                                                                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008326D0
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(?,?), ref: 008326D8
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32(?), ref: 008326E1
                                                                                                                                                                                                                                                                                                                                                        • DeleteDC.GDI32(?), ref: 008326E8
                                                                                                                                                                                                                                                                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 008326F3
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                                                                                                                                                        • String ID: (
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 19a0b26b4eff8a0e1cf11119c44bf03b69ddeb50e87162f45dacba9101f70247
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e8186a6d8b64aa710d723f887d49b43914c7514245dced594197877913144902
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 19a0b26b4eff8a0e1cf11119c44bf03b69ddeb50e87162f45dacba9101f70247
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CB61E275D01219EFCF14CFA8D885AAEBBBAFF48310F208529E955E7250E770A951CF90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • ___free_lconv_mon.LIBCMT ref: 007EDAA1
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED659
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED66B
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED67D
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED68F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6A1
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6B3
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6C5
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6D7
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6E9
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED6FB
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED70D
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED71F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED63C: _free.LIBCMT ref: 007ED731
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDA96
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: HeapFree.KERNEL32(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDAB8
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDACD
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDAD8
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDAFA
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDB0D
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDB1B
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDB26
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDB5E
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDB65
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDB82
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EDB9A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 161543041-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: b4d5840bfc30ca9022307aa1ecd3015d85341cc2b50ad69d6863f88f0ff58c12
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: cadab9b782c309b43f8f849fc2163c742b30370a4ad6403aaf63d0bd409cb1ad
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b4d5840bfc30ca9022307aa1ecd3015d85341cc2b50ad69d6863f88f0ff58c12
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 62315F71506288DFDB31AA76D84AB5677E8FF08310F115429E458E71A2EA3DFD418B20
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 0081369C
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008136A7
                                                                                                                                                                                                                                                                                                                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00813797
                                                                                                                                                                                                                                                                                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 0081380C
                                                                                                                                                                                                                                                                                                                                                        • GetDlgCtrlID.USER32(?), ref: 0081385D
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00813882
                                                                                                                                                                                                                                                                                                                                                        • GetParent.USER32(?), ref: 008138A0
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(00000000), ref: 008138A7
                                                                                                                                                                                                                                                                                                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00813921
                                                                                                                                                                                                                                                                                                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0081395D
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: %s%u
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4010501982-679674701
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a84072a21a3d19320f277c12d6fda2d5eee65f28471c589ccf53badaa9a65334
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b8174ff7018e758bc9656e04ec2446cebe36a206382cb83e366266fa773738bf
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a84072a21a3d19320f277c12d6fda2d5eee65f28471c589ccf53badaa9a65334
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C291AF71204606AFD719DF24C885FEAFBACFF45350F008629F999D2190DB34EA95CBA1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00814994
                                                                                                                                                                                                                                                                                                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 008149DA
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008149EB
                                                                                                                                                                                                                                                                                                                                                        • CharUpperBuffW.USER32(?,00000000), ref: 008149F7
                                                                                                                                                                                                                                                                                                                                                        • _wcsstr.LIBVCRUNTIME ref: 00814A2C
                                                                                                                                                                                                                                                                                                                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00814A64
                                                                                                                                                                                                                                                                                                                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00814A9D
                                                                                                                                                                                                                                                                                                                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00814AE6
                                                                                                                                                                                                                                                                                                                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00814B20
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00814B8B
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                                                                                                                                                        • String ID: ThumbnailClass
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4c35fe6e6f5a247bdd25830eca6ca770d27be02f05abf4b5ef2031bc679643ed
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: d39455dc301cfbb0c8bd6abfc5b9519509f65586d4c80559f349caab81242975
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4c35fe6e6f5a247bdd25830eca6ca770d27be02f05abf4b5ef2031bc679643ed
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D4919C710082059BDB04CF54C985BEA7BECFF84354F04946AFD8ADA196EB34ED85CBA1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00848D5A
                                                                                                                                                                                                                                                                                                                                                        • GetFocus.USER32 ref: 00848D6A
                                                                                                                                                                                                                                                                                                                                                        • GetDlgCtrlID.USER32(00000000), ref: 00848D75
                                                                                                                                                                                                                                                                                                                                                        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00848E1D
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00848ECF
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemCount.USER32(?), ref: 00848EEC
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemID.USER32(?,00000000), ref: 00848EFC
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00848F2E
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00848F70
                                                                                                                                                                                                                                                                                                                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00848FA1
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1026556194-4108050209
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4549fcead4d78ac73c0cb217f6fc99b5495b059604ec6afd907a37306efcf71e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5bad8e09058de36a4293973079b428c4bb4f82458316c40a8778dadf65e45d74
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4549fcead4d78ac73c0cb217f6fc99b5495b059604ec6afd907a37306efcf71e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E6817A71508309EBDB10CF28D888AAFBBE9FB89754F14091DF995D7291DB30D905CBA2
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(00881990,000000FF,00000000,00000030), ref: 0081BFAC
                                                                                                                                                                                                                                                                                                                                                        • SetMenuItemInfoW.USER32(00881990,00000004,00000000,00000030), ref: 0081BFE1
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(000001F4), ref: 0081BFF3
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemCount.USER32(?), ref: 0081C039
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemID.USER32(?,00000000), ref: 0081C056
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemID.USER32(?,-00000001), ref: 0081C082
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemID.USER32(?,?), ref: 0081C0C9
                                                                                                                                                                                                                                                                                                                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0081C10F
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0081C124
                                                                                                                                                                                                                                                                                                                                                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0081C145
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1460738036-4108050209
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 262cde61f2206fdcb93278877392d95e5379a2b20d64e962c00b82d99f00ca33
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 367f7f1afec4795ccb081c6da047aa1aa522907223a79dbc9b0dd2b170bc19de
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 262cde61f2206fdcb93278877392d95e5379a2b20d64e962c00b82d99f00ca33
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 51615AB498024AABDF11CF68DC88AEEBBADFF06344F104155E811E3291CB35AD85CB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0081DC20
                                                                                                                                                                                                                                                                                                                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0081DC46
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0081DC50
                                                                                                                                                                                                                                                                                                                                                        • _wcsstr.LIBVCRUNTIME ref: 0081DCA0
                                                                                                                                                                                                                                                                                                                                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0081DCBC
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                                                                                                                                                                                                                                                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1939486746-1459072770
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 924ac28626b6a1770765b58d5d8d3d9e99b408696beefd5851ac86ee9cf539d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b6763382772271541a1fe13c1474bb7c79e652c8e0e54095df0bb97da0c11f90
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 924ac28626b6a1770765b58d5d8d3d9e99b408696beefd5851ac86ee9cf539d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B541F372A40305BBDB10A765AC4BFFF377CFF52710F10406AF900E6282EA78A90196A5
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0083CC64
                                                                                                                                                                                                                                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0083CC8D
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0083CD48
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0083CCAA
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0083CCBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0083CCCF
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0083CD05
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0083CD28
                                                                                                                                                                                                                                                                                                                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0083CCF3
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                                                                                                                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 236d771883ecb8f5718df8a4d68d6aeb2cc41e63fef33f405f5dd9dfdb5d0d5c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 22b0f1c9fc82eb60db71aec6aa43807974f58b74acdc6b38951f65299314fbbe
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 236d771883ecb8f5718df8a4d68d6aeb2cc41e63fef33f405f5dd9dfdb5d0d5c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E9316C75902129BBDB609B65DC88EFFBB7CFF86754F000165B906E2240DA349A45DBE0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00823D40
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00823D6D
                                                                                                                                                                                                                                                                                                                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00823D9D
                                                                                                                                                                                                                                                                                                                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00823DBE
                                                                                                                                                                                                                                                                                                                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00823DCE
                                                                                                                                                                                                                                                                                                                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00823E55
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00823E60
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00823E6B
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: :$\$\??\%s
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 5f0a3dcb3bbc06d1f1b19e66dc39d7fcc556453781af9770c3d5d753772d8af2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: d7ec37b13efa586e67184ed12d2c18261143e34b1aa1e80b6813f2a05535bd97
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5f0a3dcb3bbc06d1f1b19e66dc39d7fcc556453781af9770c3d5d753772d8af2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1F31A176A00219ABDB209FA0DC49FEB37BCFF89700F1041A6F509D6160E7789784CB24
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • timeGetTime.WINMM ref: 0081E6B4
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CE551: timeGetTime.WINMM(?,?,0081E6D4), ref: 007CE555
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(0000000A), ref: 0081E6E1
                                                                                                                                                                                                                                                                                                                                                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0081E705
                                                                                                                                                                                                                                                                                                                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0081E727
                                                                                                                                                                                                                                                                                                                                                        • SetActiveWindow.USER32 ref: 0081E746
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0081E754
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 0081E773
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(000000FA), ref: 0081E77E
                                                                                                                                                                                                                                                                                                                                                        • IsWindow.USER32 ref: 0081E78A
                                                                                                                                                                                                                                                                                                                                                        • EndDialog.USER32(00000000), ref: 0081E79B
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                                                                                                                                                        • String ID: BUTTON
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 22c13e52455321b8ca7607fcb0225ed33e9f6ebc23cc8a47bcbf6cc2d1258a7e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3ea98f274d18cb4169a702da365f9b00772bda9d6865b8e2c172d0039125f18f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 22c13e52455321b8ca7607fcb0225ed33e9f6ebc23cc8a47bcbf6cc2d1258a7e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 96218174201204AFFB50DF68EC89E653BADFF76748F144424F915C22A1EB75AC80CB25
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0081EA5D
                                                                                                                                                                                                                                                                                                                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0081EA73
                                                                                                                                                                                                                                                                                                                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0081EA84
                                                                                                                                                                                                                                                                                                                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0081EA96
                                                                                                                                                                                                                                                                                                                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0081EAA7
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: SendString$_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e6bf2cb8509cf0db647adb5d170499a85c357bb953b725aa0141290a9e7839cb
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 466c79ea8bfe02a29b2e9699877d591223304839b2db0a0920f8bc2a81929720
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e6bf2cb8509cf0db647adb5d170499a85c357bb953b725aa0141290a9e7839cb
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1511BF20A50229B9D720A3A1DC4AEFB6F7CFFD1B40F000429B925E20D5EA744984C5B0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetKeyboardState.USER32(?), ref: 0081A012
                                                                                                                                                                                                                                                                                                                                                        • SetKeyboardState.USER32(?), ref: 0081A07D
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(000000A0), ref: 0081A09D
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(000000A0), ref: 0081A0B4
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(000000A1), ref: 0081A0E3
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(000000A1), ref: 0081A0F4
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(00000011), ref: 0081A120
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(00000011), ref: 0081A12E
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(00000012), ref: 0081A157
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(00000012), ref: 0081A165
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(0000005B), ref: 0081A18E
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(0000005B), ref: 0081A19C
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 541375521-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 497a251811f0993f0798f257375429fc50bc91dec2e6000eb5f95f13b0f4b153
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 7bb4f49127d558ea732d146b7d421f176b9fce52cb93254030d5f38b1a29d488
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 497a251811f0993f0798f257375429fc50bc91dec2e6000eb5f95f13b0f4b153
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4E51B96490578469FB39DB64C4117EABFBCEF12340F084599D5C2D61C2DA649ACCC763
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetDlgItem.USER32(?,00000001), ref: 00815CE2
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 00815CFB
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00815D59
                                                                                                                                                                                                                                                                                                                                                        • GetDlgItem.USER32(?,00000002), ref: 00815D69
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 00815D7B
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00815DCF
                                                                                                                                                                                                                                                                                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00815DDD
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 00815DEF
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00815E31
                                                                                                                                                                                                                                                                                                                                                        • GetDlgItem.USER32(?,000003EA), ref: 00815E44
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00815E5A
                                                                                                                                                                                                                                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00815E67
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3096461208-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: df0719639641416704eabca035255ab84f0f749b18f3771593a4b201515f0403
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0eb812a29dc43a0ca2b843a20ade7daea5dcc3de54e3bfe8f0eacaf70f353b37
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: df0719639641416704eabca035255ab84f0f749b18f3771593a4b201515f0403
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BE510E75B01609AFDF18CF68DD89AAEBBB9FF89300F148129F915E6290D7709E40CB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007C8BE8,?,00000000,?,?,?,?,007C8BBA,00000000,?), ref: 007C8FC5
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(?), ref: 007C8C81
                                                                                                                                                                                                                                                                                                                                                        • KillTimer.USER32(00000000,?,?,?,?,007C8BBA,00000000,?), ref: 007C8D1B
                                                                                                                                                                                                                                                                                                                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00806973
                                                                                                                                                                                                                                                                                                                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,007C8BBA,00000000,?), ref: 008069A1
                                                                                                                                                                                                                                                                                                                                                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,007C8BBA,00000000,?), ref: 008069B8
                                                                                                                                                                                                                                                                                                                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,007C8BBA,00000000), ref: 008069D4
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 008069E6
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 641708696-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 59f78126dd5f9fda10547256c65b812d82d84c57e13774994908d9309df60b37
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bcb263434e6f0378092e68be610bd50ffb88919ec2be2df314bcc872dc5a5daf
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 59f78126dd5f9fda10547256c65b812d82d84c57e13774994908d9309df60b37
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3561BD31102A10DFCBB59F18DD48B25BBF5FB41312F14456CE0429BAA0CB39ACA1DFA6
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9944: GetWindowLongW.USER32(?,000000EB), ref: 007C9952
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(0000000F), ref: 007C9862
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ColorLongWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 259745315-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e0d57f440088004a5f9b58c821e61bbba51619d6b014fa08e57b2500c340d0d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5b267e0ef934107272f051fbd7921e2ba9c0aa5ba0533bccb465315cd8ecbcb9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e0d57f440088004a5f9b58c821e61bbba51619d6b014fa08e57b2500c340d0d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 79417D35505640AFDBA05F389C88FB93BA9FB47330F14465DFAA2871E2D735A942DB10
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID: .}
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-2266125135
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f9e43d3984fe416a90cab7291451a35ea3c5704c9c9fbed47d7df97e1be1d1ea
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2be937ed8ee9abca35004e715190fcad8cb3275e3a1b5ce37c4b2fe708a5de9b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f9e43d3984fe416a90cab7291451a35ea3c5704c9c9fbed47d7df97e1be1d1ea
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2AC13675905289EFCF51DFAAC844BADBBB0BF0D310F044199E619AB392C7389941CF61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,007FF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00819717
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00000000,?,007FF7F8,00000001), ref: 00819720
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,007FF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00819742
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00000000,?,007FF7F8,00000001), ref: 00819745
                                                                                                                                                                                                                                                                                                                                                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00819866
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 747408836-2268648507
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 3cfda51a4965d2061224a6e9395e96e044ee31c20fcd36766a41474d2b0354b4
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3da26277cd922559b3b0e6bc49e58a195898d5cb668853ce9604f15d9db22a2e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3cfda51a4965d2061224a6e9395e96e044ee31c20fcd36766a41474d2b0354b4
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: AF411371800219AACB04EBE4DD9AEEEB77CFF55340F504465F605B2192EB396F88CB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                                                                                                                                                                                                                                                                                                                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 008107A2
                                                                                                                                                                                                                                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 008107BE
                                                                                                                                                                                                                                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 008107DA
                                                                                                                                                                                                                                                                                                                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00810804
                                                                                                                                                                                                                                                                                                                                                        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0081082C
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00810837
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0081083C
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 323675364-22481851
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 18910849108dce7a890fcdc0a30a1b75a0a00d841621e82f73c55500dd898c4d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c41c86ff60da3f0400585c3dd958b69d18e7d4d9c590baab1d0996459de86142
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 18910849108dce7a890fcdc0a30a1b75a0a00d841621e82f73c55500dd898c4d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0B413872C00229EBDF11EBA4DC89DEEB778FF04340B144129E915A31A1EB74AE84CF90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0084403B
                                                                                                                                                                                                                                                                                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00844042
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00844055
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 0084405D
                                                                                                                                                                                                                                                                                                                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00844068
                                                                                                                                                                                                                                                                                                                                                        • DeleteDC.GDI32(00000000), ref: 00844072
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0084407C
                                                                                                                                                                                                                                                                                                                                                        • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00844092
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 0084409E
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                                                                                                                                                                        • String ID: static
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2559357485-2160076837
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f43762fff08b41bb2b9b57e8f9cd59e48343ad725734019cddc951b628d8b9b9
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4b38fab7eda6b3b3ef4c4f8c1fe1da5bb9d282187d89e48847d2a202fdd98c2e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f43762fff08b41bb2b9b57e8f9cd59e48343ad725734019cddc951b628d8b9b9
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 43315A36502219ABDF619FA8DC09FDA3B6CFF0E324F110215FA59E61A0D775D820DB54
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 00833C5C
                                                                                                                                                                                                                                                                                                                                                        • CoInitialize.OLE32(00000000), ref: 00833C8A
                                                                                                                                                                                                                                                                                                                                                        • CoUninitialize.OLE32 ref: 00833C94
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00833D2D
                                                                                                                                                                                                                                                                                                                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00833DB1
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00833ED5
                                                                                                                                                                                                                                                                                                                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00833F0E
                                                                                                                                                                                                                                                                                                                                                        • CoGetObject.OLE32(?,00000000,0084FB98,?), ref: 00833F2D
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000000), ref: 00833F40
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00833FC4
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 00833FD8
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 429561992-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 310b64ab8eba9e7c3be35206d2d3682098833e9b83f6811a07eb76747ff0ddf8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b0c05532ad7d56a888cb74c4010604013c8d576b1888322cbecfbabd622cf773
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 310b64ab8eba9e7c3be35206d2d3682098833e9b83f6811a07eb76747ff0ddf8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FDC11271608205AFD700DF68C88496BBBE9FF89748F10491DF98ADB211DB71EE45CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CoInitialize.OLE32(00000000), ref: 00827AF3
                                                                                                                                                                                                                                                                                                                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00827B8F
                                                                                                                                                                                                                                                                                                                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00827BA3
                                                                                                                                                                                                                                                                                                                                                        • CoCreateInstance.OLE32(0084FD08,00000000,00000001,00876E6C,?), ref: 00827BEF
                                                                                                                                                                                                                                                                                                                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00827C74
                                                                                                                                                                                                                                                                                                                                                        • CoTaskMemFree.OLE32(?,?), ref: 00827CCC
                                                                                                                                                                                                                                                                                                                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00827D57
                                                                                                                                                                                                                                                                                                                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00827D7A
                                                                                                                                                                                                                                                                                                                                                        • CoTaskMemFree.OLE32(00000000), ref: 00827D81
                                                                                                                                                                                                                                                                                                                                                        • CoTaskMemFree.OLE32(00000000), ref: 00827DD6
                                                                                                                                                                                                                                                                                                                                                        • CoUninitialize.OLE32 ref: 00827DDC
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2762341140-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4b26ce802809a17d1dd9ff50a2160ae52aa40e721815ce3e31da4cf5b6ba362e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3e07028b8b9a9bdecc91e7ec1a2ce444fd55c8370204e76c459b60ea7b55d35e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4b26ce802809a17d1dd9ff50a2160ae52aa40e721815ce3e31da4cf5b6ba362e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2DC14B75A00119EFCB14DFA4D888DAEBBF9FF48304B1484A9E916DB261D730ED81CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00845504
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00845515
                                                                                                                                                                                                                                                                                                                                                        • CharNextW.USER32(00000158), ref: 00845544
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00845585
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0084559B
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008455AC
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$CharNext
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1350042424-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4cfbe50355e38dd0333251ad56e587f816efc3953ca398ac610f21f2b0026575
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8dfd5ab271c0b9f81d60831491258d3683578e9a2e4c0435a98da25e36755efd
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4cfbe50355e38dd0333251ad56e587f816efc3953ca398ac610f21f2b0026575
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 21619F7490560CEFDF509F64CC849FE7BB9FB06728F108149F925EA292D7748A81DB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0080FAAF
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 0080FB08
                                                                                                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 0080FB1A
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 0080FB3A
                                                                                                                                                                                                                                                                                                                                                        • VariantCopy.OLEAUT32(?,?), ref: 0080FB8D
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 0080FBA1
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 0080FBB6
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 0080FBC3
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0080FBCC
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 0080FBDE
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0080FBE9
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2706829360-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 73454fe1ff715a895f3dcde965c7f42dbf9aa5f6f8979d3327ca3674efa20e18
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e1a3dc52d10de2c2d2ec2c207d72e608bbb37b7187ac62d38be907bfa884417d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 73454fe1ff715a895f3dcde965c7f42dbf9aa5f6f8979d3327ca3674efa20e18
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 63415F35A01219DFCB50DF68CC689AEBBB9FF49354F00C069E945E7262CB34A945CFA4
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetKeyboardState.USER32(?), ref: 00819CA1
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00819D22
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(000000A0), ref: 00819D3D
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00819D57
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(000000A1), ref: 00819D6C
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(00000011), ref: 00819D84
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(00000011), ref: 00819D96
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(00000012), ref: 00819DAE
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(00000012), ref: 00819DC0
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00819DD8
                                                                                                                                                                                                                                                                                                                                                        • GetKeyState.USER32(0000005B), ref: 00819DEA
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 541375521-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d386c8a2160d8b4e9696b6cff84dd06ffe703883b29f3161f89eec673f896949
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4ac756ada051ed6f5c97e8d2a3ef22eafb4b79da475fa8f9ee0feff2d421e4d1
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d386c8a2160d8b4e9696b6cff84dd06ffe703883b29f3161f89eec673f896949
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E241D5346047C96DFF708664D8243F5BEE8FF12344F08805ADAC6965C2EBA499C8C7A2
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • WSAStartup.WSOCK32(00000101,?), ref: 008305BC
                                                                                                                                                                                                                                                                                                                                                        • inet_addr.WSOCK32(?), ref: 0083061C
                                                                                                                                                                                                                                                                                                                                                        • gethostbyname.WSOCK32(?), ref: 00830628
                                                                                                                                                                                                                                                                                                                                                        • IcmpCreateFile.IPHLPAPI ref: 00830636
                                                                                                                                                                                                                                                                                                                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008306C6
                                                                                                                                                                                                                                                                                                                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008306E5
                                                                                                                                                                                                                                                                                                                                                        • IcmpCloseHandle.IPHLPAPI(?), ref: 008307B9
                                                                                                                                                                                                                                                                                                                                                        • WSACleanup.WSOCK32 ref: 008307BF
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                                                                                                                                                        • String ID: Ping
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6c6303b5456878311cc395fd0f43ac3b7e4b6ee3c5b556f13f9d42707e2839d2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 890a9b139598f197213da5b6c45959010b813cdda79e84996e8a0abf4f09147b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6c6303b5456878311cc395fd0f43ac3b7e4b6ee3c5b556f13f9d42707e2839d2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4A9167356082019FD320DF19C899B1ABBE4FF88318F1485A9E46ADB6A2C735EC41CFD1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                                                                                                                                                        • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 707087890-567219261
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 3e86d6065a0e9a89aea144e1dd64b6321b5c080b7a0bf494f6e246c3cd337bbe
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 90a78edcf8663f084168a90b63eb67ea37c53a765f1495acc384709c61ec4946
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3e86d6065a0e9a89aea144e1dd64b6321b5c080b7a0bf494f6e246c3cd337bbe
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5D518031A00616DBCF14DF68C9909BEB7A5FFA4724B214229F526E7284EB35DD44C7D0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CoInitialize.OLE32 ref: 00833774
                                                                                                                                                                                                                                                                                                                                                        • CoUninitialize.OLE32 ref: 0083377F
                                                                                                                                                                                                                                                                                                                                                        • CoCreateInstance.OLE32(?,00000000,00000017,0084FB78,?), ref: 008337D9
                                                                                                                                                                                                                                                                                                                                                        • IIDFromString.OLE32(?,?), ref: 0083384C
                                                                                                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 008338E4
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 00833936
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                                                                                                                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 636576611-1287834457
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6b29be6bb1937d9edfe9d6fd0db38bbc51a82e99456c34b2f48f8574a17e85e7
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6cddecab79ad8871549343a6c0d4c90db660dbfc4de05ef1879aa6d1fe3bd628
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6b29be6bb1937d9edfe9d6fd0db38bbc51a82e99456c34b2f48f8574a17e85e7
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DD6159B4608301AFD310DF54C889B6ABBE8FF89714F104929F995DB291C774EE48CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 008233CF
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 008233F0
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4099089115-3080491070
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7142b1ed3cb79f5af9ccfd49f4bf376ca0e2db01c250d55f187c9cc3b900ca74
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4306ef850d39e4e6f7aad73a72c4e0ff3be64cf4962e258a73550ceb2f8df60b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7142b1ed3cb79f5af9ccfd49f4bf376ca0e2db01c250d55f187c9cc3b900ca74
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FA51A371800219EADF14EBA0DD5AEEEB7B8FF14340F204065F119B2151EB396F98DB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1256254125-769500911
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 61c0155671e3f2669a1662d988e1b2342c69914ace5b6fea8ffac2fa343b47da
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: cb380ac7da1442273fc2c591bf2d50ce2b3ccfaaaa10d0ee1fe13686e9b32751
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 61c0155671e3f2669a1662d988e1b2342c69914ace5b6fea8ffac2fa343b47da
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4D41A032A001269BCB206F7988A05FEB7A9FFB17A4F244229E525D7284F735CDC1C690
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 008253A0
                                                                                                                                                                                                                                                                                                                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00825416
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 00825420
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 008254A7
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                                                                                                                                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4194297153-14809454
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c3472e5c528a082446a2894f8633d010d2591f534d079579d86b0b40f5de2b2b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 50c0c3b545787483bf7cbd5eab23f08f67032dfe1d1d9d40023dd666d82a3c06
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c3472e5c528a082446a2894f8633d010d2591f534d079579d86b0b40f5de2b2b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6D31D2B5A40614DFD710EF68D488BAABBB4FF05305F148066E505CB292E771DDC6CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateMenu.USER32 ref: 00843C79
                                                                                                                                                                                                                                                                                                                                                        • SetMenu.USER32(?,00000000), ref: 00843C88
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00843D10
                                                                                                                                                                                                                                                                                                                                                        • IsMenu.USER32(?), ref: 00843D24
                                                                                                                                                                                                                                                                                                                                                        • CreatePopupMenu.USER32 ref: 00843D2E
                                                                                                                                                                                                                                                                                                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00843D5B
                                                                                                                                                                                                                                                                                                                                                        • DrawMenuBar.USER32 ref: 00843D63
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0$F
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 161812096-3044882817
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 71c8fd9c983dba33de3926d474a02cbfeb2434a30892d7ed57d4c19cce65d648
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fd888473996f90fdc6f8c2a8df4fb9a123c2a2671e5dc7477db360518a91c825
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 71c8fd9c983dba33de3926d474a02cbfeb2434a30892d7ed57d4c19cce65d648
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BA412779A02209EFDB14DF64D884BAEBBB9FF49350F140029E956A7360D770AA11CB94
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00811F64
                                                                                                                                                                                                                                                                                                                                                        • GetDlgCtrlID.USER32 ref: 00811F6F
                                                                                                                                                                                                                                                                                                                                                        • GetParent.USER32 ref: 00811F8B
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00811F8E
                                                                                                                                                                                                                                                                                                                                                        • GetDlgCtrlID.USER32(?), ref: 00811F97
                                                                                                                                                                                                                                                                                                                                                        • GetParent.USER32(?), ref: 00811FAB
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00811FAE
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: baf27075a124c8aeae314851a3b7f90137e49caa0000450ad59482434fb60a6d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4d3bc2548a1a7201342eff14d7863019603d101ce725feafc6decb823a6afb35
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: baf27075a124c8aeae314851a3b7f90137e49caa0000450ad59482434fb60a6d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F321B374A00118BBCF44AFA0CC89AEEBBB8FF16314F104119BA65A7291DB785949DB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00812043
                                                                                                                                                                                                                                                                                                                                                        • GetDlgCtrlID.USER32 ref: 0081204E
                                                                                                                                                                                                                                                                                                                                                        • GetParent.USER32 ref: 0081206A
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 0081206D
                                                                                                                                                                                                                                                                                                                                                        • GetDlgCtrlID.USER32(?), ref: 00812076
                                                                                                                                                                                                                                                                                                                                                        • GetParent.USER32(?), ref: 0081208A
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 0081208D
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f1fd6916b25bbd3dfc6e1c15c44d4a978097a7e7ba87c753da7ef50d33173ae3
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5d8af3269f41b278c269c2139d875599891a2ce7111731a0f9cbd4470951da0b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f1fd6916b25bbd3dfc6e1c15c44d4a978097a7e7ba87c753da7ef50d33173ae3
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9121D7B5900218BBCF14AFA0CC89EFEBBBCFF19344F104005BA65A7191D7794554DB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00843A9D
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00843AA0
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00843AC7
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00843AEA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00843B62
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00843BAC
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00843BC7
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00843BE2
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00843BF6
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00843C13
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 312131281-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: b36c6fa13d8c906a34c9adcb2f31529d9fdf4a57c04368defd06e6e247e5a32e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 06b1834d92bbfcd46ba937aa7ff566edff02a09fb7628493f902ccb89660bb0e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b36c6fa13d8c906a34c9adcb2f31529d9fdf4a57c04368defd06e6e247e5a32e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FB617775A00208AFDB11DFA8CC85EEEB7B8FB09714F104199FA15E72A1C774AA46DF50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0081B151
                                                                                                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0081A1E1,?,00000001), ref: 0081B165
                                                                                                                                                                                                                                                                                                                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0081B16C
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0081A1E1,?,00000001), ref: 0081B17B
                                                                                                                                                                                                                                                                                                                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0081B18D
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0081A1E1,?,00000001), ref: 0081B1A6
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0081A1E1,?,00000001), ref: 0081B1B8
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0081A1E1,?,00000001), ref: 0081B1FD
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0081A1E1,?,00000001), ref: 0081B212
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0081A1E1,?,00000001), ref: 0081B21D
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2156557900-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2ce2ec533c8e28eec879781e5703d6e6d5a3ea3c9dbf2e818ce61bdc61ed408b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: d7dfd91ac48a9c2f86063d4c9b0975a32e418046316e917454caa7fa5a5ea460
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2ce2ec533c8e28eec879781e5703d6e6d5a3ea3c9dbf2e818ce61bdc61ed408b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3D31A9B5601604BFDB10AF68DC58FAD7BADFF62711F218009FA01DA190D7B49A84CF64
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2C94
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: HeapFree.KERNEL32(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2CA0
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2CAB
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2CB6
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2CC1
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2CCC
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2CD7
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2CE2
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2CED
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2CFB
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6a5642ee0f4265d412e1b5124f56cbb85029b90440b2839ac6e66c2600181a35
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 652d438804ef9c724adc7d609681b5c562699d3d061682c5deed2efa36a3ee23
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6a5642ee0f4265d412e1b5124f56cbb85029b90440b2839ac6e66c2600181a35
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9D11B376101148EFCB02EF56D846C9D3BA9BF09350F5254A0FA48AB233D639EA519F90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00827FAD
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00827FC1
                                                                                                                                                                                                                                                                                                                                                        • GetFileAttributesW.KERNEL32(?), ref: 00827FEB
                                                                                                                                                                                                                                                                                                                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00828005
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00828017
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00828060
                                                                                                                                                                                                                                                                                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008280B0
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                                                                                                                                                        • String ID: *.*
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 769691225-438819550
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 15159bcc5d01456358efb080b8c0ba9bf1e9d4648a77b2db2fdfa16cbe39be94
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 04672a6c4cc442ebd48c1820beb9078b5bb82227de0c67f45853a57616257c1e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 15159bcc5d01456358efb080b8c0ba9bf1e9d4648a77b2db2fdfa16cbe39be94
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0281C076508255DBCB20EF15D844AAAB3E8FF88714F55486EF885C7250EB34ED84CBA2
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(?,000000EB), ref: 007B5C7A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B5D0A: GetClientRect.USER32(?,?), ref: 007B5D30
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B5D0A: GetWindowRect.USER32(?,?), ref: 007B5D71
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B5D0A: ScreenToClient.USER32(?,?), ref: 007B5D99
                                                                                                                                                                                                                                                                                                                                                        • GetDC.USER32 ref: 007F46F5
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 007F4708
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 007F4716
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 007F472B
                                                                                                                                                                                                                                                                                                                                                        • ReleaseDC.USER32(?,00000000), ref: 007F4733
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 007F47C4
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                                                                                                                                                        • String ID: U
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 51bfc8d57aa8a0e34585e1a044a973e03e8b4678cecb6ab39cbe38197646279b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 02f2abdcbaf424dbf86495f22651afc7e668d08a574b6fb4baaeab3f8151260d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 51bfc8d57aa8a0e34585e1a044a973e03e8b4678cecb6ab39cbe38197646279b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CF71E135500209DFCF219F68C984BFB7BB6FF4A360F144269EE559A266C7398841DF60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 008235E4
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00882390,?,00000FFF,?), ref: 0082360A
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4099089115-2391861430
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 77649d3f5a9ae6c421c0708659f2871c0036acc6fc8808a0481f2c536b6c3605
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a48a8a34419c28ff3563222028f5279c371d02c04acc1052cbd9fadf4c8e0768
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 77649d3f5a9ae6c421c0708659f2871c0036acc6fc8808a0481f2c536b6c3605
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FE513B71800219FACF14EBA4DC9AEEEBB78FF14300F144125F215A21A1EB395AD9DF61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C912D: GetCursorPos.USER32(?), ref: 007C9141
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C912D: ScreenToClient.USER32(00000000,?), ref: 007C915E
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C912D: GetAsyncKeyState.USER32(00000001), ref: 007C9183
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C912D: GetAsyncKeyState.USER32(00000002), ref: 007C919D
                                                                                                                                                                                                                                                                                                                                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00848B6B
                                                                                                                                                                                                                                                                                                                                                        • ImageList_EndDrag.COMCTL32 ref: 00848B71
                                                                                                                                                                                                                                                                                                                                                        • ReleaseCapture.USER32 ref: 00848B77
                                                                                                                                                                                                                                                                                                                                                        • SetWindowTextW.USER32(?,00000000), ref: 00848C12
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00848C25
                                                                                                                                                                                                                                                                                                                                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00848CFF
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                                                                                                                                                                                                                                                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1924731296-2107944366
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: b9d2b486549bb48f83f7eb5fd392749fffde70dc5b9d8c78a1cd3a6db1121a50
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: cd7ee7684c5200a518a8d975bad4f5a53b9271fedbb12ef62b5b572548c68286
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b9d2b486549bb48f83f7eb5fd392749fffde70dc5b9d8c78a1cd3a6db1121a50
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BB516C71105304AFD740EF24DC9AFAE7BE8FB88714F40062DFA56972A1DB74A904CB62
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0082C272
                                                                                                                                                                                                                                                                                                                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0082C29A
                                                                                                                                                                                                                                                                                                                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0082C2CA
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 0082C322
                                                                                                                                                                                                                                                                                                                                                        • SetEvent.KERNEL32(?), ref: 0082C336
                                                                                                                                                                                                                                                                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 0082C341
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8034bf4c8262d34c9def46e377874ab1b2221defc5f4d5c38e9963dbdc3cabf2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3a89b5d80945110745e383bff48d8acbcafa968d149f7bdf3c7c825cde2d7352
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8034bf4c8262d34c9def46e377874ab1b2221defc5f4d5c38e9963dbdc3cabf2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8F317CB5500618AFD721DFA8A888ABF7AFCFB49744B10891EA446D2200DB74DD848B61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,007F3AAF,?,?,Bad directive syntax error,0084CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 008198BC
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00000000,?,007F3AAF,?), ref: 008198C3
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00819987
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 858772685-4153970271
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: fd1863f1c27539792cbbf70b8af028657b1bb30e9cc320a01425770b1479bf00
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e1bbf06c5e3e51803466a8de2ed01a127228210785854a541e8f189fb746ae31
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fd1863f1c27539792cbbf70b8af028657b1bb30e9cc320a01425770b1479bf00
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8B21713180021DFBCF15AF90CC1AEEE7B79FF14304F044459F629A61A2EB3996A8CB10
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetParent.USER32 ref: 008120AB
                                                                                                                                                                                                                                                                                                                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 008120C0
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0081214D
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                                                                                                                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6892a3a97441899cfb81af8dcdf1fe6a99f3574a5f61602b55ff6310859656e3
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: cab16a55a736dad167132639c66e664090987a771a4beaa6e93f9de000dcc777
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6892a3a97441899cfb81af8dcdf1fe6a99f3574a5f61602b55ff6310859656e3
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A7113A7A684706FAF705A220DC0ACFA33ACFF15324B20801AFB08F41D1FBA9B8915614
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1282221369-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8321e2c0fa5952564485060166c2f5765e33a2a55eacae668c18c89f0fd95f37
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fe8dd19ac04ea27b3e7256d47128b552c4b5116a2b9408b64761d3a90be52154
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8321e2c0fa5952564485060166c2f5765e33a2a55eacae668c18c89f0fd95f37
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A4614C77906384EFDB32AFBA984966D7BA9AF0D310F04456DF940A7243D63D9D028B50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00845186
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(?,00000000), ref: 008451C7
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 008451CD
                                                                                                                                                                                                                                                                                                                                                        • SetFocus.USER32(?,?,00000005,?,00000000), ref: 008451D1
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00846FBA: DeleteObject.GDI32(00000000), ref: 00846FE6
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0084520D
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0084521A
                                                                                                                                                                                                                                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0084524D
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00845287
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00845296
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3210457359-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8f0a84837acae2106faca4cfe8207961aef71eed7c610e1a167031ebecd97dc6
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 75e6c107adff9cb8b1013354cbe0fab6900dfba01e3ccc17adeb4e9faf1527d8
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8f0a84837acae2106faca4cfe8207961aef71eed7c610e1a167031ebecd97dc6
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6A519C30A41A1CFFEF609F28CC4AB9D7B65FB05325F148016FA25D62E2C7B5A980DB41
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00806890
                                                                                                                                                                                                                                                                                                                                                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 008068A9
                                                                                                                                                                                                                                                                                                                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 008068B9
                                                                                                                                                                                                                                                                                                                                                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 008068D1
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 008068F2
                                                                                                                                                                                                                                                                                                                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007C8874,00000000,00000000,00000000,000000FF,00000000), ref: 00806901
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0080691E
                                                                                                                                                                                                                                                                                                                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,007C8874,00000000,00000000,00000000,000000FF,00000000), ref: 0080692D
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1268354404-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 711e42a9a0a428c5c1f22cd27fe0e912172af0326fa9979c58ea1f0744ffc6d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5e0b3aa9ee89f5fef339af56f5f62f411b8c91e415d8fa41549e1ec92fd17814
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 711e42a9a0a428c5c1f22cd27fe0e912172af0326fa9979c58ea1f0744ffc6d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DC5169B0600209EFDB608F28CC55FAA7BB9FB54750F10452CF906D62A0EB74ADA0DB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0082C182
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 0082C195
                                                                                                                                                                                                                                                                                                                                                        • SetEvent.KERNEL32(?), ref: 0082C1A9
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0082C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0082C272
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0082C253: GetLastError.KERNEL32 ref: 0082C322
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0082C253: SetEvent.KERNEL32(?), ref: 0082C336
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0082C253: InternetCloseHandle.WININET(00000000), ref: 0082C341
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 337547030-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1392931aa63f858ddfd21a0f10396e5e67c51c1ebaafeffc0c2336b9c4281c31
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1fad6b94899d83c3edd4abb21bee5866492c9e844697abbb36857ef45cc2a9d1
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1392931aa63f858ddfd21a0f10396e5e67c51c1ebaafeffc0c2336b9c4281c31
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1E317A75201A15EFDB219FA9ED44A7ABBECFF19300B00441EF956C3610DB71E894DBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00813A57
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813A3D: GetCurrentThreadId.KERNEL32 ref: 00813A5E
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008125B3), ref: 00813A65
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 008125BD
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 008125DB
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 008125DF
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 008125E9
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00812601
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00812605
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 0081260F
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00812623
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00812627
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2014098862-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7b0984cd7907b28f8c79523810c55c46ad1e50261fb4f8d92e5bf4eee38d5269
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 493717cd3c3f6c731c72a4779ce87681a4376879d2b4514bf4dd99fd7cefdc96
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7b0984cd7907b28f8c79523810c55c46ad1e50261fb4f8d92e5bf4eee38d5269
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F001D430391624BBFB5067689C8AF993F5DFF5EB12F100005F318EE0D1C9E22484CAAA
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00811449,?,?,00000000), ref: 0081180C
                                                                                                                                                                                                                                                                                                                                                        • HeapAlloc.KERNEL32(00000000,?,00811449,?,?,00000000), ref: 00811813
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00811449,?,?,00000000), ref: 00811828
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00811449,?,?,00000000), ref: 00811830
                                                                                                                                                                                                                                                                                                                                                        • DuplicateHandle.KERNEL32(00000000,?,00811449,?,?,00000000), ref: 00811833
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00811449,?,?,00000000), ref: 00811843
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentProcess.KERNEL32(00811449,00000000,?,00811449,?,?,00000000), ref: 0081184B
                                                                                                                                                                                                                                                                                                                                                        • DuplicateHandle.KERNEL32(00000000,?,00811449,?,?,00000000), ref: 0081184E
                                                                                                                                                                                                                                                                                                                                                        • CreateThread.KERNEL32(00000000,00000000,00811874,00000000,00000000,00000000), ref: 00811868
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1957940570-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: fbffd52bbafdab8eaa33673d74369d63bcf9bc1551bdd7e9b8d689e1d5a860b4
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e1545f617d9ed093512c0ae81740e26d641096b2133053a529326da6fffc7ba4
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fbffd52bbafdab8eaa33673d74369d63bcf9bc1551bdd7e9b8d689e1d5a860b4
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9C01BF75241304BFE750AFA5DC4DF577B6CFB8AB11F004411FA05DB291C6749800CB20
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                                                                                                                                                        • String ID: }}}$}}}$}}}
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1036877536-3712723652
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2ef9044cc96cb930592fc49d528f646039efd0b3cf06b1c9450ee25cef0daeb1
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 54A13672E023CA9FDB25CE1AC8957AEBBF4EF69350F1441ADE5859B282C23C9941C750
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0081D501
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0081D50F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081D4DC: CloseHandle.KERNELBASE(00000000), ref: 0081D5DC
                                                                                                                                                                                                                                                                                                                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0083A16D
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 0083A180
                                                                                                                                                                                                                                                                                                                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0083A1B3
                                                                                                                                                                                                                                                                                                                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0083A268
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(00000000), ref: 0083A273
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0083A2C4
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                                                                                                                                                        • String ID: SeDebugPrivilege
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a88f93238cd0c984cff6eeb4d7c2add1d401e09bab9853f6241ff7b1cc215371
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4d846aa3c4f8722dd4e7e7ae55cdf7a52d50d44e2fa4fc403450ff3e8d7537ae
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a88f93238cd0c984cff6eeb4d7c2add1d401e09bab9853f6241ff7b1cc215371
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CA617C352042419FD724DF18C498F6ABBE5FF94318F18848CE4A68B7A2C776EC45CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00843925
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0084393A
                                                                                                                                                                                                                                                                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00843954
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00843999
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 008439C6
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008439F4
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: SysListView32
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2147712094-78025650
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 516584b5e9d54be3f3f86b86adc7f4aa4f35022470e1b525bffc4f1d72398f33
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c4156df9ba1ecace648a7964666f7849b244d3472a945f105902a763cd32c8c1
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 516584b5e9d54be3f3f86b86adc7f4aa4f35022470e1b525bffc4f1d72398f33
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: AB419071A0021DABEF219F64CC49FEA7BA9FF18354F10052AF958E7281D7759A84CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0081BCFD
                                                                                                                                                                                                                                                                                                                                                        • IsMenu.USER32(00000000), ref: 0081BD1D
                                                                                                                                                                                                                                                                                                                                                        • CreatePopupMenu.USER32 ref: 0081BD53
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemCount.USER32(01475418), ref: 0081BDA4
                                                                                                                                                                                                                                                                                                                                                        • InsertMenuItemW.USER32(01475418,?,00000001,00000030), ref: 0081BDCC
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0$2
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 93392585-3793063076
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d40a031f9b1c6e555172a7e0ff5f2f74f58140553fb3cbf8237a4a43a56fee47
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8c04d156cbcd072e3a0200ddd7f069fc3ae875498a4e437ceabaad1bdcd5e795
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d40a031f9b1c6e555172a7e0ff5f2f74f58140553fb3cbf8237a4a43a56fee47
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6B519D70A002099BDB18CFA8E884BEEBBFCFF59354F144159E411D7291D7709981CB62
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 007D2D4B
                                                                                                                                                                                                                                                                                                                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 007D2D53
                                                                                                                                                                                                                                                                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 007D2DE1
                                                                                                                                                                                                                                                                                                                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 007D2E0C
                                                                                                                                                                                                                                                                                                                                                        • _ValidateLocalCookies.LIBCMT ref: 007D2E61
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                                                                                                                                                        • String ID: &H}$csm
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1170836740-1162412510
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8608dd33a8c4024f99c47c004bc79eaaa6db64ddcb8d5e521ab2ea8eeb40b62f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 118d084391ac4172cf6fee337a7ac770208e97e22df8aaa1233abafc2b610a67
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8608dd33a8c4024f99c47c004bc79eaaa6db64ddcb8d5e521ab2ea8eeb40b62f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 73418334A00209EBCF10DF68C849A9EBBB5BF55325F148156E814AB393D739EA07CBD1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadIconW.USER32(00000000,00007F03), ref: 0081C913
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: IconLoad
                                                                                                                                                                                                                                                                                                                                                        • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2457776203-404129466
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2ae56a1f4dc3212ac7c34fc668664f4e552b34b3bb489755a5fd78101758795b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 9807f232328a5f0a175306db4e8cf3e36ccffc431eef0a70c28afb61f8944fc9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2ae56a1f4dc3212ac7c34fc668664f4e552b34b3bb489755a5fd78101758795b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3F11EB316C970ABBE7055B64DCC3DEE6BACFF153A8B10402BF504EA382E7749D805268
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0.0.0.0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 642191829-3771769585
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7341adfd98c4d3630dbc102563198110d322635cdaf5a0440e88c24756da5cb8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ff9669d03a003c2c052ca9fd71111b7b7fce2ec781579f1f722ec9a6799b6424
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7341adfd98c4d3630dbc102563198110d322635cdaf5a0440e88c24756da5cb8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 82110671904208ABCB20AB74DC4AFEE77BCFF11712F00016AF445EA191EF789AC1CA60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                        • GetSystemMetrics.USER32(0000000F), ref: 00849FC7
                                                                                                                                                                                                                                                                                                                                                        • GetSystemMetrics.USER32(0000000F), ref: 00849FE7
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0084A224
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0084A242
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0084A263
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(00000003,00000000), ref: 0084A282
                                                                                                                                                                                                                                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 0084A2A7
                                                                                                                                                                                                                                                                                                                                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 0084A2CA
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1211466189-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: cfa2600791feda47e4410ac7a1c10ca1013f761378e6637d5e52cee1dbe0d7db
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 16be15c9631476998185123445340289ee5e948179f8a3665175c0a5948b9631
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: cfa2600791feda47e4410ac7a1c10ca1013f761378e6637d5e52cee1dbe0d7db
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BEB1A831640229EFDF18CF68C9857AA7BB2FF48701F088169EC49DF295DB71AA40DB51
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 952045576-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 04c5372de8eb1873e21e32fb3d03d5a2fb39121935eb3c7a8b5c5d4eb1ae946c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 389caaa2f7e6486d3cd412b7bc9ee63a3f130b795d9126dbcf6affb63562bb78
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 04c5372de8eb1873e21e32fb3d03d5a2fb39121935eb3c7a8b5c5d4eb1ae946c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 38413066C10118B6CB11ABA4CC8A9CFB7BCBF45710F508567E914E3221EB38F655C7A5
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0080682C,00000004,00000000,00000000), ref: 007CF953
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0080682C,00000004,00000000,00000000), ref: 0080F3D1
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0080682C,00000004,00000000,00000000), ref: 0080F454
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ShowWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1268545403-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: dcc60f7b1e1924092b7bd7857935c668a3cbd63d90f476103a4c1dca10821bc4
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a6453ec4c8fbcb9c122900d419848f6c3bd1d1ff11f5d25f6df2d3bbed559c43
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: dcc60f7b1e1924092b7bd7857935c668a3cbd63d90f476103a4c1dca10821bc4
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5D410B31604640BECFB99B2D8C88F6A7B97BB57314F15843DE547D6AA1C639B880CB11
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32(00000000), ref: 00842D1B
                                                                                                                                                                                                                                                                                                                                                        • GetDC.USER32(00000000), ref: 00842D23
                                                                                                                                                                                                                                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00842D2E
                                                                                                                                                                                                                                                                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00842D3A
                                                                                                                                                                                                                                                                                                                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00842D76
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00842D87
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00845A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00842DC2
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00842DE1
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3864802216-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2a8bf2ac24aa6f3025763c7968ff8f80a9c87bca0a46c706d2a769a39dc1b95d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8d1d835def44a4b617544cbfb1d019268fe8f89c87f6e9589d48514b21c2f79b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2a8bf2ac24aa6f3025763c7968ff8f80a9c87bca0a46c706d2a769a39dc1b95d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C5318B76202618BBEB618F548C8AFEB3BADFB1A715F044055FE08DA291C6759C40CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _memcmp
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2931989736-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9b1c59b45cdc702fe540f14d4b847d40414fb1de738304dc1a0ade642da27afd
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 9933a1819148baa94e5a3b837b3675173f2c4f3209ea0b72ae873b3b79142542
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9b1c59b45cdc702fe540f14d4b847d40414fb1de738304dc1a0ade642da27afd
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0F21A461640A1DFBD21456219E82FFA336CFFB1398F840025FE05DA782F768ED5085E5
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-572801152
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: da6cc382f42540bc0aafdb1968fd08e0b0682d8ec6718eb771f79730019e961a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: d87ce0b7debc63f3d11874e6f96025d6e8097110919a3ee400aabcfa78b44c87
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: da6cc382f42540bc0aafdb1968fd08e0b0682d8ec6718eb771f79730019e961a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4DD1B171A0060A9FDF14CFA8C891BAEB7B5FF88344F148469E915EB281E771DD45CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 007F15CE
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007F1651
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,007F17FB,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007F16E4
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007F16FB
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E3820: RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,007F17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 007F1777
                                                                                                                                                                                                                                                                                                                                                        • __freea.LIBCMT ref: 007F17A2
                                                                                                                                                                                                                                                                                                                                                        • __freea.LIBCMT ref: 007F17AE
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2829977744-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 13f48d208eae259ae6b90c8f67263c1a8beb31bb93aa49b45ec4708bf5d1ee54
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: f960eb553dcd8e8399dd4a0c7bd2b636a07a0008b8c6d75e4a4fc859b04bd888
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 13f48d208eae259ae6b90c8f67263c1a8beb31bb93aa49b45ec4708bf5d1ee54
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3B91D272E0020EDADB209E75C885AFE7BB5AF49310F980659EA05E7341DB3DCC40CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInit
                                                                                                                                                                                                                                                                                                                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2610073882-625585964
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0a4dfeae11af0bc01e7e5733605be44dd13b2f6b04627bc95ea70524440fedb0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b69d16cf29bdf4d5597274a6f0b3bd00897730b82014934abe181b4b8a4ff24a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0a4dfeae11af0bc01e7e5733605be44dd13b2f6b04627bc95ea70524440fedb0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4C918071A00219ABDF20CFA4C849FAEBBB8FF86714F108559F515EB281D770A945CFA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0082125C
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00821284
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008212A8
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008212D8
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0082135F
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008213C4
                                                                                                                                                                                                                                                                                                                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00821430
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2550207440-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6baedcfb2dcb52a449c19a6e8ea6c4920b25094feb3bda93baa6ec8c69242a24
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 69118c65de981e0fd4ed82761f028aa11aeaf672254865f0d3299f610373332c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6baedcfb2dcb52a449c19a6e8ea6c4920b25094feb3bda93baa6ec8c69242a24
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F391F875A00229DFDF10DF98E888BBEB7B6FF55314F204029E540E7291D778A981CB95
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3225163088-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d1438ddd6a0d4058aef5065cda5dac30633742fd29149990b6214ed33295c35e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c39692197ff473fc4b91154692a539489bfa86297fe9fe4bd10bf905995b3f3f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d1438ddd6a0d4058aef5065cda5dac30633742fd29149990b6214ed33295c35e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 90912871D00219EFCB54CFA9CC88AEEBBB8FF49320F148459E515B7291D778AA51CB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 0083396B
                                                                                                                                                                                                                                                                                                                                                        • CharUpperBuffW.USER32(?,?), ref: 00833A7A
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00833A8A
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 00833C1F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00820CDF: VariantInit.OLEAUT32(00000000), ref: 00820D1F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00820CDF: VariantCopy.OLEAUT32(?,?), ref: 00820D28
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00820CDF: VariantClear.OLEAUT32(?), ref: 00820D34
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6938be363450651657b940a4b5642adce8350f9ab51e42f3ba9d27e062ce3d29
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6daf9bec3c81aaeed986939b92f2ebdfce75beaf5306c47a06590a572782942d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6938be363450651657b940a4b5642adce8350f9ab51e42f3ba9d27e062ce3d29
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B19122746083059FC704EF28C48596ABBE4FF89314F14882DF89ADB351DB35EA45CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?,?,0081035E), ref: 0081002B
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810046
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810054
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?), ref: 00810064
                                                                                                                                                                                                                                                                                                                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00834C51
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00834D59
                                                                                                                                                                                                                                                                                                                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00834DCF
                                                                                                                                                                                                                                                                                                                                                        • CoTaskMemFree.OLE32(?), ref: 00834DDA
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                                                                                                                                                        • String ID: NULL Pointer assignment
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 614568839-2785691316
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8197c466b9303bf2e389d5a8b1627b59e7f71fae024a986f9e8e7a4a52c2cac5
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ea7331fc2bc5830537dbbc4625f427f2d856cb5394e85750d15b112607c18346
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8197c466b9303bf2e389d5a8b1627b59e7f71fae024a986f9e8e7a4a52c2cac5
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B4910271D0021DEBDF10DFA4C895AEEB7B8FF48314F10816AE915A7251EB34AA45CFA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetMenu.USER32(?), ref: 00842183
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemCount.USER32(00000000), ref: 008421B5
                                                                                                                                                                                                                                                                                                                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008421DD
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00842213
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemID.USER32(?,?), ref: 0084224D
                                                                                                                                                                                                                                                                                                                                                        • GetSubMenu.USER32(?,?), ref: 0084225B
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00813A57
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813A3D: GetCurrentThreadId.KERNEL32 ref: 00813A5E
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008125B3), ref: 00813A65
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008422E3
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081E97B: Sleep.KERNEL32 ref: 0081E9F3
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4196846111-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2f8970c3377c7e3364db6bbf65c8a0b69c7ca95d1eb0a68eb99278ddab57098f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e6cda4d440ac6c76116605662989f93abe92810b6398822c8ff8b9d760ee3586
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2f8970c3377c7e3364db6bbf65c8a0b69c7ca95d1eb0a68eb99278ddab57098f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1B718D35A04219EFCB10EF68C885AAEB7B5FF88314F548499F816EB341DB74A941CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • IsWindow.USER32(014755F8), ref: 00847F37
                                                                                                                                                                                                                                                                                                                                                        • IsWindowEnabled.USER32(014755F8), ref: 00847F43
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0084801E
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(014755F8,000000B0,?,?), ref: 00848051
                                                                                                                                                                                                                                                                                                                                                        • IsDlgButtonChecked.USER32(?,?), ref: 00848089
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(014755F8,000000EC), ref: 008480AB
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 008480C3
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4072528602-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 315589bd96fecb5f8b0bed77a461c0223da951321f09e8f23d330467babf746d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 36cca413520b2b0f99ddd7e6c35bfe123b34de5d60a9fdc0c7cbeda76e369020
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 315589bd96fecb5f8b0bed77a461c0223da951321f09e8f23d330467babf746d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 65717B34609648EFEF219F64CC84FAABBB9FF1A300F14445AE955D7261CB31AC49DB20
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetParent.USER32(?), ref: 0081AEF9
                                                                                                                                                                                                                                                                                                                                                        • GetKeyboardState.USER32(?), ref: 0081AF0E
                                                                                                                                                                                                                                                                                                                                                        • SetKeyboardState.USER32(?), ref: 0081AF6F
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 0081AF9D
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 0081AFBC
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 0081AFFD
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0081B020
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 87235514-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7c2ff83f1b8bb5f65496e3c68cdd68329b750ec523ddf89554eb63cc92962717
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: daaef3bf9fbe884a05e94011962fe118d78b88c63b485cab95f6d9b616464a8f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7c2ff83f1b8bb5f65496e3c68cdd68329b750ec523ddf89554eb63cc92962717
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0951D3A06056D53DFB364234C845BFA7EADBF06304F088489F1D9D54C2D798A8C9D761
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetParent.USER32(00000000), ref: 0081AD19
                                                                                                                                                                                                                                                                                                                                                        • GetKeyboardState.USER32(?), ref: 0081AD2E
                                                                                                                                                                                                                                                                                                                                                        • SetKeyboardState.USER32(?), ref: 0081AD8F
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0081ADBB
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0081ADD8
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0081AE17
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0081AE38
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 87235514-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 66876ec56975f88d7a196934986750a947e2f527e023f05b9cf515eba92e285a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 64e42eea90bc66f171473a7e24b011b4b9dee5810eefa3c1de4163f44fdc658d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 66876ec56975f88d7a196934986750a947e2f527e023f05b9cf515eba92e285a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2C51C5A15057D53DFB3A8264CC95BFA7E9CBF46304F088488E1D9C58C2D294ACD8D752
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetConsoleCP.KERNEL32(007F3CD6,?,?,?,?,?,?,?,?,007E5BA3,?,?,007F3CD6,?,?), ref: 007E5470
                                                                                                                                                                                                                                                                                                                                                        • __fassign.LIBCMT ref: 007E54EB
                                                                                                                                                                                                                                                                                                                                                        • __fassign.LIBCMT ref: 007E5506
                                                                                                                                                                                                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,007F3CD6,00000005,00000000,00000000), ref: 007E552C
                                                                                                                                                                                                                                                                                                                                                        • WriteFile.KERNEL32(?,007F3CD6,00000000,007E5BA3,00000000,?,?,?,?,?,?,?,?,?,007E5BA3,?), ref: 007E554B
                                                                                                                                                                                                                                                                                                                                                        • WriteFile.KERNEL32(?,?,00000001,007E5BA3,00000000,?,?,?,?,?,?,?,?,?,007E5BA3,?), ref: 007E5584
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1324828854-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 68a802c488cecacd979064e183d00ecd0cc90d5eb5bf0403831b2718933f3c8c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: dacc7c6475ec322bf08e78eeec23da1f53e2c8c9574a45080d5e5ac792db6e95
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 68a802c488cecacd979064e183d00ecd0cc90d5eb5bf0403831b2718933f3c8c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DD51F370A016889FDB10CFA9D845AEEBBFAFF0D304F14401AF555E7292E734AA50CB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0083307A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083304E: _wcslen.LIBCMT ref: 0083309B
                                                                                                                                                                                                                                                                                                                                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00831112
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 00831121
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 008311C9
                                                                                                                                                                                                                                                                                                                                                        • closesocket.WSOCK32(00000000), ref: 008311F9
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2675159561-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: aa80fb04d662afc9f981e1a1107a232f5b826f3ea205324764ac09d89f51b4fd
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8fc72b3eb03d402af1503b91e775391a531c19a66e874b557d7537fc45723185
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: aa80fb04d662afc9f981e1a1107a232f5b826f3ea205324764ac09d89f51b4fd
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CF41C035600208AFDB109F18C889BEEBBA9FF85768F148059F915DB291C774AD41CBE1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0081CF22,?), ref: 0081DDFD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0081CF22,?), ref: 0081DE16
                                                                                                                                                                                                                                                                                                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0081CF45
                                                                                                                                                                                                                                                                                                                                                        • MoveFileW.KERNEL32(?,?), ref: 0081CF7F
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0081D005
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0081D01B
                                                                                                                                                                                                                                                                                                                                                        • SHFileOperationW.SHELL32(?), ref: 0081D061
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                                                                                                                                                        • String ID: \*.*
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 02ccf2360dced0eb2229c3ff1ece7d7324274acd33aa8fda42f86dc179f51871
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b6d8cd6df0018168083554ed81900cc52b34d5308be313d6f0a8a5e3fcfb86c9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 02ccf2360dced0eb2229c3ff1ece7d7324274acd33aa8fda42f86dc179f51871
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 55415FB18452199FDF12EFA4D985ADEB7BDFF08380F1000A6E505EB141EE74A689CB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00842E1C
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00842E4F
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00842E84
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00842EB6
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00842EE0
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00842EF1
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00842F0B
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2178440468-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 05960b333e27ea0bedafb902aafc1eb931dd9eebbd26dd56047a1d36ada3867f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: db0c86f74fd0b533bcee217cc3ab0a5ff1fa3f74fdfeea95374af0de6c00b9bf
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 05960b333e27ea0bedafb902aafc1eb931dd9eebbd26dd56047a1d36ada3867f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 47311234609248AFEB60CF58DC88F653BE8FB9A714F9501A4F915CB2B2CB71AC41DB01
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00817769
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0081778F
                                                                                                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32(00000000), ref: 00817792
                                                                                                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32(?), ref: 008177B0
                                                                                                                                                                                                                                                                                                                                                        • SysFreeString.OLEAUT32(?), ref: 008177B9
                                                                                                                                                                                                                                                                                                                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 008177DE
                                                                                                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32(?), ref: 008177EC
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3761583154-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: bc35cb86fc725625e38f51081ab3baa72aa7ec1a2b3ec120432a7548d96acc49
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c09d96912ef472a9659014b43281c070289188b6ff4d46ee32eca98d83a8cad1
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bc35cb86fc725625e38f51081ab3baa72aa7ec1a2b3ec120432a7548d96acc49
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DD219C7A605219AFDB10AFA8CC88DFA73ACFF09364B048429FA15DB191D6749C81C764
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00817842
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00817868
                                                                                                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32(00000000), ref: 0081786B
                                                                                                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32 ref: 0081788C
                                                                                                                                                                                                                                                                                                                                                        • SysFreeString.OLEAUT32 ref: 00817895
                                                                                                                                                                                                                                                                                                                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 008178AF
                                                                                                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32(?), ref: 008178BD
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3761583154-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 882e7b2b65a268c5209c3315800dece2ce73ae4b4aa70e6f27b9d1975da12d52
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 15a0a2aa352e7835d3628aaa5ccc35edd1ae092a56bd61a10fab9e2e7b81d063
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 882e7b2b65a268c5209c3315800dece2ce73ae4b4aa70e6f27b9d1975da12d52
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F0213E75609208AF9B10AFA8DC88DEA77BCFF097607108139F915CB2A1D674DC81CB78
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetStdHandle.KERNEL32(0000000C), ref: 008204F2
                                                                                                                                                                                                                                                                                                                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0082052E
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                                                                                                                        • String ID: nul
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4eadd0d0f406ed8b37d85d1a844c9417d68d7bf44d1dd90423ea920de8a05be2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8f387ed2f0c2db72fc2c2410181b423b9adc0da78c6ef4113ae05e63b9ebc45c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4eadd0d0f406ed8b37d85d1a844c9417d68d7bf44d1dd90423ea920de8a05be2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9F216275600329ABDB209F69ED44A5A77F8FF45724F204A19F8A1E62E1D7B09980CF60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetStdHandle.KERNEL32(000000F6), ref: 008205C6
                                                                                                                                                                                                                                                                                                                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00820601
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CreateHandlePipe
                                                                                                                                                                                                                                                                                                                                                        • String ID: nul
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d1d30adf5126f0eb903041bf036a9491207d0c5c8829c9e4900feedd0499b632
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0a50b54d4eef082041caebc020258a3c34bedfe85ce6e8c1ce5863e85a8a15e9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d1d30adf5126f0eb903041bf036a9491207d0c5c8829c9e4900feedd0499b632
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 28216775500325AFDB209F69EC44A5A77E8FF95724F200A19F8A1E72E6D7B099A0CF10
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 007B604C
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B600E: GetStockObject.GDI32(00000011), ref: 007B6060
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 007B606A
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00844112
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0084411F
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0084412A
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00844139
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00844145
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: Msctls_Progress32
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 74233505dac18087fe67519f97f4bef570f99e2ec352a1962b501147ec7b8ae8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 48f1f3db62b34d7c1d21f2766930cbb49648fec5eaff06b5cc8e436533e29a80
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 74233505dac18087fe67519f97f4bef570f99e2ec352a1962b501147ec7b8ae8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B41190B214021DBEEF119E64CC86EE77F5DFF18798F014111BA18E2150CA769C21DBA4
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007ED7A3: _free.LIBCMT ref: 007ED7CC
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED82D
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: HeapFree.KERNEL32(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED838
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED843
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED897
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED8A2
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED8AD
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED8B8
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bb49280d3295ce41be947cc3099dc98e118f2387f72571b85a4e8dd66a6e4271
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3E112171542B88EAD531BFB2CC4FFCB7BDC6F08700F404825B699A64A3DA6DB9064A50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0081DA74
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00000000), ref: 0081DA7B
                                                                                                                                                                                                                                                                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0081DA91
                                                                                                                                                                                                                                                                                                                                                        • LoadStringW.USER32(00000000), ref: 0081DA98
                                                                                                                                                                                                                                                                                                                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0081DADC
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        • %s (%d) : ==> %s: %s %s, xrefs: 0081DAB9
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                                                                                                                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0c10b0d34af12b616334150b5399298cc02a490a04e45654805d7876532d5ec1
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 397092b9d2479e009854f95dc3065eeb54fcf66dcdef4eb4466dc10a41d40ec7
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0c10b0d34af12b616334150b5399298cc02a490a04e45654805d7876532d5ec1
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6D016DF69002187FE750EBE49D89EEB376CFB09305F404496B746E2041EA749E848F74
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • InterlockedExchange.KERNEL32(0146E200,0146E200), ref: 0082097B
                                                                                                                                                                                                                                                                                                                                                        • EnterCriticalSection.KERNEL32(0146E1E0,00000000), ref: 0082098D
                                                                                                                                                                                                                                                                                                                                                        • TerminateThread.KERNEL32(?,000001F6), ref: 0082099B
                                                                                                                                                                                                                                                                                                                                                        • WaitForSingleObject.KERNEL32(?,000003E8), ref: 008209A9
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 008209B8
                                                                                                                                                                                                                                                                                                                                                        • InterlockedExchange.KERNEL32(0146E200,000001F6), ref: 008209C8
                                                                                                                                                                                                                                                                                                                                                        • LeaveCriticalSection.KERNEL32(0146E1E0), ref: 008209CF
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3495660284-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f8f19885ec25f99b793cb3409d946e5655ed91dabc2f03c6761e76172889a649
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c27ea578c84097ac68dfa3844e3a88c0e6e700d7df2165cc86b00996453fc88a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f8f19885ec25f99b793cb3409d946e5655ed91dabc2f03c6761e76172889a649
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: EFF0EC36543A22BBD7915FA4EE8DBD6BB39FF06702F402025F202908A1C7B594A5CF90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00831DC0
                                                                                                                                                                                                                                                                                                                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00831DE1
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 00831DF2
                                                                                                                                                                                                                                                                                                                                                        • htons.WSOCK32(?,?,?,?,?), ref: 00831EDB
                                                                                                                                                                                                                                                                                                                                                        • inet_ntoa.WSOCK32(?), ref: 00831E8C
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 008139E8: _strlen.LIBCMT ref: 008139F2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00833224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0082EC0C), ref: 00833240
                                                                                                                                                                                                                                                                                                                                                        • _strlen.LIBCMT ref: 00831F35
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3203458085-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9bae0b70891882a6a9376a5eb39f5cbf020750a730d896a485199b26f2ad2adf
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 24f9ec1f9ee6fdc7d3b0b1df1fee2a43731d8519edc6804243d9a3bda527edaf
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9bae0b70891882a6a9376a5eb39f5cbf020750a730d896a485199b26f2ad2adf
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B6B1CE30204340AFC724DF24C889F6A7BA5FF85718F54895CF5569B2A2CB75ED42CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetClientRect.USER32(?,?), ref: 007B5D30
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 007B5D71
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 007B5D99
                                                                                                                                                                                                                                                                                                                                                        • GetClientRect.USER32(?,?), ref: 007B5ED7
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 007B5EF8
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1296646539-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4d16a9b7c4e20251a851246524c987ba5d43520c1eeac7b6ca8907a455d86baf
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 735e8d0b6caff71039bd0a7ef852065b70e4b6c7056a287e9183832cdee80c16
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4d16a9b7c4e20251a851246524c987ba5d43520c1eeac7b6ca8907a455d86baf
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 00B15739A00A4ADBDB10CFA9C4807FAB7F1FF58310F14851AE9A9D7250DB38EA51DB54
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • __allrem.LIBCMT ref: 007E00BA
                                                                                                                                                                                                                                                                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007E00D6
                                                                                                                                                                                                                                                                                                                                                        • __allrem.LIBCMT ref: 007E00ED
                                                                                                                                                                                                                                                                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007E010B
                                                                                                                                                                                                                                                                                                                                                        • __allrem.LIBCMT ref: 007E0122
                                                                                                                                                                                                                                                                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007E0140
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1992179935-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b20514696396fda7d49a5843c09301fa8ca21e88b1e6ecd21a39ffc6a3bbf7db
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 49810672602746EBE7209F2ACC45B6F73F9AF49324F24453AF511DA381E7B8D9408790
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,007D82D9,007D82D9,?,?,?,007E644F,00000001,00000001,8BE85006), ref: 007E6258
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,007E644F,00000001,00000001,8BE85006,?,?,?), ref: 007E62DE
                                                                                                                                                                                                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007E63D8
                                                                                                                                                                                                                                                                                                                                                        • __freea.LIBCMT ref: 007E63E5
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E3820: RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                                                                                                                                                                                                                                                                                                                                                        • __freea.LIBCMT ref: 007E63EE
                                                                                                                                                                                                                                                                                                                                                        • __freea.LIBCMT ref: 007E6413
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1414292761-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9402296ca708fc4792ad87e211bd88c132335c43ffb9a3d687f62096d0bfe413
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 156c82dfe7b9aa2514b5020d008673c770ba74f8bdd7a0ea57b22a5bbd12d1d8
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9402296ca708fc4792ad87e211bd88c132335c43ffb9a3d687f62096d0bfe413
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7E510472602296ABDB258F66CC85EBF77A9EF58790F144629FD05D7180EB38DC40C6A0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0083B6AE,?,?), ref: 0083C9B5
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083C9F1
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA68
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA9E
                                                                                                                                                                                                                                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083BCCA
                                                                                                                                                                                                                                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0083BD25
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0083BD6A
                                                                                                                                                                                                                                                                                                                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0083BD99
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0083BDF3
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0083BDFF
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1120388591-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 3bf67fdcd52f3eb3742f42f905c97e76a4bd28b0b19e69094eff45e6a18e14c4
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2a2830a9a89c550ffab2c42ac810b7802420bb4711ecf27d7a727d71da4d3fae
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3bf67fdcd52f3eb3742f42f905c97e76a4bd28b0b19e69094eff45e6a18e14c4
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7281A070208241EFD714DF24C895E6ABBE5FF84308F14895DF6598B2A2DB31ED45CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(00000035), ref: 0080F7B9
                                                                                                                                                                                                                                                                                                                                                        • SysAllocString.OLEAUT32(00000001), ref: 0080F860
                                                                                                                                                                                                                                                                                                                                                        • VariantCopy.OLEAUT32(0080FA64,00000000), ref: 0080F889
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(0080FA64), ref: 0080F8AD
                                                                                                                                                                                                                                                                                                                                                        • VariantCopy.OLEAUT32(0080FA64,00000000), ref: 0080F8B1
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 0080F8BB
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3859894641-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c0daa87be509465dc15cb7dc44de345f60b467517157a08ccb9cd5abaf162445
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4b932705aeb3ec34ec0f726314d81d7ebfaa5aede649a36723e624c1718585a2
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c0daa87be509465dc15cb7dc44de345f60b467517157a08ccb9cd5abaf162445
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E7511731600314EADFB0AB65DC95B69B7A8FF45314B20C42AEA02DF6D3D7748C40C796
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                                                                                                                                                                                                                                                                                                                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 008294E5
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00829506
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0082952D
                                                                                                                                                                                                                                                                                                                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00829585
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                                                                                                                                                        • String ID: X
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 83654149-3081909835
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 10a4654e55f47da04e4e83fcb33582dd1e43d28fcf4a96c4fc49ba94a12762e8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2fbcf54583fa761b377acb6f7820c5eccfc9df1326cc8bcf9d45b17c50c0e9f8
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 10a4654e55f47da04e4e83fcb33582dd1e43d28fcf4a96c4fc49ba94a12762e8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 71E1AE31604310DFC724EF24D889BAAB7E4FF84314F14896DE9999B2A2DB34DD45CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                        • BeginPaint.USER32(?,?,?), ref: 007C9241
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 007C92A5
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 007C92C2
                                                                                                                                                                                                                                                                                                                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007C92D3
                                                                                                                                                                                                                                                                                                                                                        • EndPaint.USER32(?,?,?,?,?), ref: 007C9321
                                                                                                                                                                                                                                                                                                                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 008071EA
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9339: BeginPath.GDI32(00000000), ref: 007C9357
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3050599898-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e331c05b1789766830afaba4f11a83c2b7602612c1e4d8683a46b1080adbbe3f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ac66086d4325e7e2a011fe797acfbd339b212d36ffc8b43932e60ec032e0dff3
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e331c05b1789766830afaba4f11a83c2b7602612c1e4d8683a46b1080adbbe3f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1E418C70505201EFDB51DF28CC88FAA7BA8FB56320F14066DFA95C72E1CB35A846DB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0082080C
                                                                                                                                                                                                                                                                                                                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00820847
                                                                                                                                                                                                                                                                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 00820863
                                                                                                                                                                                                                                                                                                                                                        • LeaveCriticalSection.KERNEL32(?), ref: 008208DC
                                                                                                                                                                                                                                                                                                                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008208F3
                                                                                                                                                                                                                                                                                                                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00820921
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3368777196-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: afed01b1b1b4e6232a8317980d632a37be0345a4b3b6111256bbbe8d22c4da5e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 05cd6cd3e21b83c3ee9e1bfccf5d61e33f8d31a31e4c79350daf2c97486b4793
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: afed01b1b1b4e6232a8317980d632a37be0345a4b3b6111256bbbe8d22c4da5e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F6416B71900215EBDF14AF64DC89A6A77B9FF04300F1440A9ED04DA297DB74DEA1DFA4
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0080F3AB,00000000,?,?,00000000,?,0080682C,00000004,00000000,00000000), ref: 0084824C
                                                                                                                                                                                                                                                                                                                                                        • EnableWindow.USER32(?,00000000), ref: 00848272
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008482D1
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(?,00000004), ref: 008482E5
                                                                                                                                                                                                                                                                                                                                                        • EnableWindow.USER32(?,00000001), ref: 0084830B
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0084832F
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 642888154-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d34b490438f3b770e3ca7d68df8556ec132c2bfecfd2a476fa43e1cda6e6b118
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 560e613173ccbea6f468740666c0c89179e7c25fd6238db91fbc56e709dabd04
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d34b490438f3b770e3ca7d68df8556ec132c2bfecfd2a476fa43e1cda6e6b118
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BB41A534601658EFDF51CF29CC99BE87BE5FB0A714F185269E5188B262CB71AC41CB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • IsWindowVisible.USER32(?), ref: 00814C95
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00814CB2
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00814CEA
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00814D08
                                                                                                                                                                                                                                                                                                                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00814D10
                                                                                                                                                                                                                                                                                                                                                        • _wcsstr.LIBVCRUNTIME ref: 00814D1A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 72514467-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 5907559136ce51b66fa596a98554a82302cda54c0ca30aa4e96fe5e557e0857f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: dafa1353e084389a723a73f2631bd3020530227d14f701c609522a2e58ba2d6b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5907559136ce51b66fa596a98554a82302cda54c0ca30aa4e96fe5e557e0857f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9E213876205204BBEB555B39EC09EBB7BACEF45750F10907EF809CA192EA75DC81D2A0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B3A97,?,?,007B2E7F,?,?,?,00000000), ref: 007B3AC2
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0082587B
                                                                                                                                                                                                                                                                                                                                                        • CoInitialize.OLE32(00000000), ref: 00825995
                                                                                                                                                                                                                                                                                                                                                        • CoCreateInstance.OLE32(0084FCF8,00000000,00000001,0084FB68,?), ref: 008259AE
                                                                                                                                                                                                                                                                                                                                                        • CoUninitialize.OLE32 ref: 008259CC
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: .lnk
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3172280962-24824748
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f07f93dbc57686f00b6ebbb5e2df5cd26396f75515e79a0778075418720a209a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3aa551f535abcae5cf4e8a6e1f23ddd9778886301623694da6f0f7d8d77352cb
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f07f93dbc57686f00b6ebbb5e2df5cd26396f75515e79a0778075418720a209a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6CD15071608611DFC714DF24D488A6ABBE5FF89720F148859F88ADB361DB31EC85CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00810FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00810FCA
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00810FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00810FD6
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00810FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00810FE5
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00810FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00810FEC
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00810FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00811002
                                                                                                                                                                                                                                                                                                                                                        • GetLengthSid.ADVAPI32(?,00000000,00811335), ref: 008117AE
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 008117BA
                                                                                                                                                                                                                                                                                                                                                        • HeapAlloc.KERNEL32(00000000), ref: 008117C1
                                                                                                                                                                                                                                                                                                                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 008117DA
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000,00811335), ref: 008117EE
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 008117F5
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3008561057-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 43388ad88ae111a0e3ddeab9fe74fcf3b32928b59066d5211acfefd5fbdad174
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1791a53b9c0f37753701697067b9e25a0c276fe39f103af1701c0a300f2c51dc
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 43388ad88ae111a0e3ddeab9fe74fcf3b32928b59066d5211acfefd5fbdad174
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BB118636602609EBDF109FA4CC49FEE7BADFF42359F104818E581E7294C736A980CB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 008114FF
                                                                                                                                                                                                                                                                                                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00811506
                                                                                                                                                                                                                                                                                                                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00811515
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000004), ref: 00811520
                                                                                                                                                                                                                                                                                                                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0081154F
                                                                                                                                                                                                                                                                                                                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00811563
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1413079979-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a206740ca971809b4b692bdef07b1e2c230afe89498ca4c7da505547bb625867
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: befebe8f913ca5f7072692a5b3c4c8e4d74bc3703ab63a3da87fb2a367805a30
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a206740ca971809b4b692bdef07b1e2c230afe89498ca4c7da505547bb625867
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BC11297660220DABDF118F98DD49FDE7BAEFF49744F044015FA05A2160C3758EA0DB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,?,007D3379,007D2FE5), ref: 007D3390
                                                                                                                                                                                                                                                                                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 007D339E
                                                                                                                                                                                                                                                                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007D33B7
                                                                                                                                                                                                                                                                                                                                                        • SetLastError.KERNEL32(00000000,?,007D3379,007D2FE5), ref: 007D3409
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3852720340-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8f679d1fc18ddb6b33a6122ef1b81c0675551b63e3e46570032e7ed149332895
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5a2af98d07fef3641b7fd9a02d44239554d3a57a71ada4ed1d44270af326a66c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8f679d1fc18ddb6b33a6122ef1b81c0675551b63e3e46570032e7ed149332895
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3D012432209711FEAA242BB4BC8D5262AB8FB05379320022FF414963F1EF198D819186
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,?,007E5686,007F3CD6,?,00000000,?,007E5B6A,?,?,?,?,?,007DE6D1,?,00878A48), ref: 007E2D78
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2DAB
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2DD3
                                                                                                                                                                                                                                                                                                                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,007DE6D1,?,00878A48,00000010,007B4F4A,?,?,00000000,007F3CD6), ref: 007E2DE0
                                                                                                                                                                                                                                                                                                                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,007DE6D1,?,00878A48,00000010,007B4F4A,?,?,00000000,007F3CD6), ref: 007E2DEC
                                                                                                                                                                                                                                                                                                                                                        • _abort.LIBCMT ref: 007E2DF2
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3160817290-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 30691485b4a6b20d126be4be2b8801a9c5ac44aa787ae20c930edb3673c64dcb
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: dcd59a9627bac9f6fcdb89895675d94b15d61b2987c9438e7278907d289b71f5
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 30691485b4a6b20d126be4be2b8801a9c5ac44aa787ae20c930edb3673c64dcb
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8DF0F935607580B7C25267376C0EA1A265DBBCA7A4F314119F624D32A3EE2C88034160
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007C9693
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9639: SelectObject.GDI32(?,00000000), ref: 007C96A2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9639: BeginPath.GDI32(?), ref: 007C96B9
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9639: SelectObject.GDI32(?,00000000), ref: 007C96E2
                                                                                                                                                                                                                                                                                                                                                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00848A4E
                                                                                                                                                                                                                                                                                                                                                        • LineTo.GDI32(?,00000003,00000000), ref: 00848A62
                                                                                                                                                                                                                                                                                                                                                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00848A70
                                                                                                                                                                                                                                                                                                                                                        • LineTo.GDI32(?,00000000,00000003), ref: 00848A80
                                                                                                                                                                                                                                                                                                                                                        • EndPath.GDI32(?), ref: 00848A90
                                                                                                                                                                                                                                                                                                                                                        • StrokePath.GDI32(?), ref: 00848AA0
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 43455801-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 3d321a40a4a2f199871ad92441e7804a5175939dfea7f1ba3df9303118f39fef
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6fc316a5b477960c6d52a3f73b5bf95c4b115089fbf2906a7f119267e4524209
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 3d321a40a4a2f199871ad92441e7804a5175939dfea7f1ba3df9303118f39fef
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F411057600111CFFEF129F94DC88EAA7F6CFB09394F048022FA199A1A1C771AD55DBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetDC.USER32(00000000), ref: 00815218
                                                                                                                                                                                                                                                                                                                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00815229
                                                                                                                                                                                                                                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00815230
                                                                                                                                                                                                                                                                                                                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00815238
                                                                                                                                                                                                                                                                                                                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0081524F
                                                                                                                                                                                                                                                                                                                                                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00815261
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CapsDevice$Release
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1035833867-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2b35a14a6b9404fa82cd2ee3cf8cede32e987296bda9735f90f77c51db30cb75
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 26fcf05aff55e071b714a06cb8017ff89b591e320e8addc1cc98217dd0ef9d72
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2b35a14a6b9404fa82cd2ee3cf8cede32e987296bda9735f90f77c51db30cb75
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B1014F75A01719BBEB109BA69C49A5EBFBCFF49751F048066FA04E7291DA709800CFA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 007B1BF4
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 007B1BFC
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007B1C07
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007B1C12
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 007B1C1A
                                                                                                                                                                                                                                                                                                                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 007B1C22
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Virtual
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4278518827-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 63b053ac44c51eae03ab861f12dd4979592de3ca2760f43d626d9661ffc6f3f0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3f8686ace90b27130a065b1dffd0cc3d05dc5a0dd8acd1c2a841b472654460b8
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 63b053ac44c51eae03ab861f12dd4979592de3ca2760f43d626d9661ffc6f3f0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B10167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CFE5
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0081EB30
                                                                                                                                                                                                                                                                                                                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0081EB46
                                                                                                                                                                                                                                                                                                                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 0081EB55
                                                                                                                                                                                                                                                                                                                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0081EB64
                                                                                                                                                                                                                                                                                                                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0081EB6E
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0081EB75
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 839392675-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e66797af8c43b99b37343f043edbcd3cdcb46727e616ce3037a06bf5ea47335d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 901d6b6c9596cd258f93bb76504fc56fc0e80b314647739ba9a3f5df6893303c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e66797af8c43b99b37343f043edbcd3cdcb46727e616ce3037a06bf5ea47335d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D1F0BEBA202158BBE7605B629C0EEEF3E7CFFCBB11F004158FA02E1090D7A01A01C6B4
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetClientRect.USER32(?), ref: 00807452
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00807469
                                                                                                                                                                                                                                                                                                                                                        • GetWindowDC.USER32(?), ref: 00807475
                                                                                                                                                                                                                                                                                                                                                        • GetPixel.GDI32(00000000,?,?), ref: 00807484
                                                                                                                                                                                                                                                                                                                                                        • ReleaseDC.USER32(?,00000000), ref: 00807496
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(00000005), ref: 008074B0
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 272304278-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: acb979966e7a7a8ae8b3401b6dc3d0b94f7d225158ff5ee21d12e7a87cc43d1b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a1a110e5c03d7311928d127f5015a7cefbee78a13102714282868b4eb6ec928e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: acb979966e7a7a8ae8b3401b6dc3d0b94f7d225158ff5ee21d12e7a87cc43d1b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6D018635801605EFEB905FA4DC08BAE7BB9FB05321F224068FA16A21A1CB312E41EB14
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0081187F
                                                                                                                                                                                                                                                                                                                                                        • UnloadUserProfile.USERENV(?,?), ref: 0081188B
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 00811894
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 0081189C
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 008118A5
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 008118AC
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 146765662-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 16a481885e78c2fa61b1b01d01873b95588c74c7b80c024a57098c4260f90122
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1c0937363f03f0a46bf8fc9774ef32a150b21399f27d2067bf766a607b505bf1
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 16a481885e78c2fa61b1b01d01873b95588c74c7b80c024a57098c4260f90122
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B1E0E53A206101BBDB415FA5ED0C90AFF3DFF4AB22B108220F22581170CB329420DF50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0081C6EE
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0081C735
                                                                                                                                                                                                                                                                                                                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0081C79C
                                                                                                                                                                                                                                                                                                                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0081C7CA
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 07f071f758cc28aaf820014ada13b5ff5706221963663505c47a7b4ffbbaac9a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: eb8bf6c51b4bbe777219372a5a75404beadabe73d54c1f13d426a15ea12e24b4
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 07f071f758cc28aaf820014ada13b5ff5706221963663505c47a7b4ffbbaac9a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FE51AD716843019BD714AF28C889BEA77ECFF59314F040A2DF996D21E1DBA4D984CB52
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 0083AEA3
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                                                                                                                                                                                                                                                                                                                                                        • GetProcessId.KERNEL32(00000000), ref: 0083AF38
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0083AF67
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: <$@
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 146682121-1426351568
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 55f2c6bdc8518e5e7b8c9020cb6ac88392c8c49f369e0b82041d814d904c7282
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0e93e18584d8fd4e031ba74f8871918c6b0a72136bb4e8682d7f72f6ddc2bcfa
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 55f2c6bdc8518e5e7b8c9020cb6ac88392c8c49f369e0b82041d814d904c7282
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 87718A75A00619DFCB18DF54C489A9EBBF4FF48314F048499E856AB3A2CB78ED41CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00817206
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0081723C
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0081724D
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 008172CF
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                                                                                                                                                        • String ID: DllGetClassObject
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 753597075-1075368562
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 38a6ffc5ca8cbca647b1fc7f10cd762c66a8f94732e9ebd2ada5964b33278f4b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1ca5c98b3e6a3f8f05037f39f97756a81cdd12291725abb556c542c6cfa0c9e7
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 38a6ffc5ca8cbca647b1fc7f10cd762c66a8f94732e9ebd2ada5964b33278f4b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D9412971A04205AFDB15CF54C884ADA7BBDFF49314B1480ADBD0ADF20AD7B1D985CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00843E35
                                                                                                                                                                                                                                                                                                                                                        • IsMenu.USER32(?), ref: 00843E4A
                                                                                                                                                                                                                                                                                                                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00843E92
                                                                                                                                                                                                                                                                                                                                                        • DrawMenuBar.USER32 ref: 00843EA5
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 45180c6f9bd4b2ccfb32527353aac6a5f9f7ddb61013cd8a837b161c1244ee81
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b52c46acbfc5dd71368a9f03236ddabf6cb1de7dcc274b189626b5d1a03da5cf
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 45180c6f9bd4b2ccfb32527353aac6a5f9f7ddb61013cd8a837b161c1244ee81
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CF414575A0220DEFDB10EF64D884AAABBB9FF49354F044129E915EB650D730AE45CF60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00811E66
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00811E79
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00811EA9
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                                                                                                                                                        • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0163a0b856274115527c463ab6c6aa0d95de3b7a0fda01019a2ea9bc08f0663a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6dd28082749322f52527f9083762dc85afc477b2eb9fa2f146637e5ffa25ed64
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0163a0b856274115527c463ab6c6aa0d95de3b7a0fda01019a2ea9bc08f0663a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6B210771A00108BADF14ABA4DC4DDFFB7BDFF45354B104119FA26E71E1DB3849459620
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00842F8D
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryW.KERNEL32(?), ref: 00842F94
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00842FA9
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(?), ref: 00842FB1
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: SysAnimate32
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 62840c4a7149199b99da4e1aa952f25cc0ae62149e190b09335d082f571e427d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: d45e6647133c00990e823b7ae1700e6fe0e827252d86e0245c9451369a3b9770
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 62840c4a7149199b99da4e1aa952f25cc0ae62149e190b09335d082f571e427d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5821AE7120820DABEB205F64DC84EBB77BDFB69364F904218F950D2190DB71DC559760
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,007D4D1E,007E28E9,?,007D4CBE,007E28E9,008788B8,0000000C,007D4E15,007E28E9,00000002), ref: 007D4D8D
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007D4DA0
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,007D4D1E,007E28E9,?,007D4CBE,007E28E9,008788B8,0000000C,007D4E15,007E28E9,00000002,00000000), ref: 007D4DC3
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                                                                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8400c6adf447e1ce7be9f633a421b9195ce8996fef8a6b3035f2c9ce3c026de3
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 009cc838ae82663efe9e218ba111b8a39ed9961825e89eb936bcd1728044c400
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8400c6adf447e1ce7be9f633a421b9195ce8996fef8a6b3035f2c9ce3c026de3
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A6F04F35A41208BBDB519F90DC49BADBFB9FF48756F0000A9F909A2360DB359940CED0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryA.KERNEL32 ref: 0080D3AD
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0080D3BF
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 0080D3E5
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                                                                                                        • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 145871493-2590602151
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 803d85b4c19a42dda54a395bf521526526d6d7a17e6ad91fb263cb61b7087ae2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 50cf7d2b85a3fb04d981a5bf85736a1ed49d82a929f3706e93277faa45b8956b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 803d85b4c19a42dda54a395bf521526526d6d7a17e6ad91fb263cb61b7087ae2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9EF05C75407714EBD7F117904C08A197718FF11705B558059F801E12C9EB24DD44C795
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007B4EDD,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E9C
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 007B4EAE
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,007B4EDD,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4EC0
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                                                                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 145871493-3689287502
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 91501abc1e4e3c3b6cebd153be5206cabbfd4d53cfcfcd39315af6641b26217c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2cf28801316f23443af8c7466a14622f30a442b876fc85099be98b51582b6bda
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 91501abc1e4e3c3b6cebd153be5206cabbfd4d53cfcfcd39315af6641b26217c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 05E01D39A036225BD3B11B296C19B9F755CFF82F667050115FD05D2256DB6CCD01C5A1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007F3CDE,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E62
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 007B4E74
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,007F3CDE,?,00881418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007B4E87
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                                                                                                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 145871493-1355242751
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7891c0e88bb014a026f9a1884b5abb12965c8ba9d4e8197aa0781b516d3ca84e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 9e149030d5132c0ccb954c4f8892cf3a71f8393d6646c3f192616eb68c94063c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7891c0e88bb014a026f9a1884b5abb12965c8ba9d4e8197aa0781b516d3ca84e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 97D01239503A615756A21B256C1CECB7B1CFF86B653054515B905E2215CF69CD01C5E1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00822C05
                                                                                                                                                                                                                                                                                                                                                        • DeleteFileW.KERNEL32(?), ref: 00822C87
                                                                                                                                                                                                                                                                                                                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00822C9D
                                                                                                                                                                                                                                                                                                                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00822CAE
                                                                                                                                                                                                                                                                                                                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00822CC0
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: File$Delete$Copy
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3226157194-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2dc4cd29e3665cff6724ea84d06863270825e32bf28432f9d93befc31df5ce20
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 63e30089b1e106abe8d7d06f8cbb448471273090a60a21a06621a022785827c6
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2dc4cd29e3665cff6724ea84d06863270825e32bf28432f9d93befc31df5ce20
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BFB14E71900129ABDF21EBA4DC89EDEB77DFF49350F1040A6F509E6251EA349A848B61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 0083A427
                                                                                                                                                                                                                                                                                                                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0083A435
                                                                                                                                                                                                                                                                                                                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0083A468
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?), ref: 0083A63D
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3488606520-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a942619eb881ba7aaad3c3eda8f56ef51a977885ed7b09dcb719623cb619ed74
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e88a837d78b4ac00a62b3dc50a748321c95022841be92e8bd062cacdef286bf5
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a942619eb881ba7aaad3c3eda8f56ef51a977885ed7b09dcb719623cb619ed74
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 15A18B71604300AFD724DF24C886F2AB7E5AF84714F14885DF99ADB292DBB4ED41CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00853700), ref: 007EBB91
                                                                                                                                                                                                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0088121C,000000FF,00000000,0000003F,00000000,?,?), ref: 007EBC09
                                                                                                                                                                                                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00881270,000000FF,?,0000003F,00000000,?), ref: 007EBC36
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EBB7F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: HeapFree.KERNEL32(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007EBD4B
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1286116820-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: fcf0fb82c6287e71868a296efed0f754408fb048da87c9f7d0621dfedb676e9d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2fcc91935c9eae57e1f9454c71886fc0123a347d5135a8e6ac745fa33e5973bb
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fcf0fb82c6287e71868a296efed0f754408fb048da87c9f7d0621dfedb676e9d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7F51FB71905249DFCB10EF6A9C899AFBFBCFF48310F10026AE554D72A1EB349D418BA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0081CF22,?), ref: 0081DDFD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0081CF22,?), ref: 0081DE16
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081E199: GetFileAttributesW.KERNEL32(?,0081CF95), ref: 0081E19A
                                                                                                                                                                                                                                                                                                                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0081E473
                                                                                                                                                                                                                                                                                                                                                        • MoveFileW.KERNEL32(?,?), ref: 0081E4AC
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0081E5EB
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0081E603
                                                                                                                                                                                                                                                                                                                                                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0081E650
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3183298772-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 51147a078b55d69c0d916ce7ce82d8b678ecd426660258f6de41b1658309781f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 26cac6b81c3406e3b3c6c13bf8bc32650a8d8f255ae7dd6e01368d19f0ea68fa
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 51147a078b55d69c0d916ce7ce82d8b678ecd426660258f6de41b1658309781f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 765162B24087459BC724DBA4DC859DBB3ECEF85340F00491EFA89D3151EF74A688C76A
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0083B6AE,?,?), ref: 0083C9B5
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083C9F1
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA68
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083C998: _wcslen.LIBCMT ref: 0083CA9E
                                                                                                                                                                                                                                                                                                                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0083BAA5
                                                                                                                                                                                                                                                                                                                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0083BB00
                                                                                                                                                                                                                                                                                                                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0083BB63
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(?,?), ref: 0083BBA6
                                                                                                                                                                                                                                                                                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0083BBB3
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 826366716-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 976e26c04b20bc5a12d954d09e38dc3fbec1d8eeaebcadf6e6dbb938daf35e18
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 915a1bf8fdf480946be1e8e1bf6379da5583708308921a02e4bb1aa5b71d09d6
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 976e26c04b20bc5a12d954d09e38dc3fbec1d8eeaebcadf6e6dbb938daf35e18
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D161BE71209241EFC314DF24C494E6ABBE9FF84318F14899CF5998B2A2DB31ED45CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • VariantInit.OLEAUT32(?), ref: 00818BCD
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32 ref: 00818C3E
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32 ref: 00818C9D
                                                                                                                                                                                                                                                                                                                                                        • VariantClear.OLEAUT32(?), ref: 00818D10
                                                                                                                                                                                                                                                                                                                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00818D3B
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4136290138-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a192d7347853d5542ce2014cbe6a5da05734a6ca6751ca69ea49e780e344b7ca
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0717e7c583a6d0fa4bff7d2146e98a97055155ff2052df60ec8de89695b084e9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a192d7347853d5542ce2014cbe6a5da05734a6ca6751ca69ea49e780e344b7ca
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0A5167B5A00219EFCB10CF68D884AAAB7F8FF89314B158559F909DB350E730E911CF90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00828BAE
                                                                                                                                                                                                                                                                                                                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00828BDA
                                                                                                                                                                                                                                                                                                                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00828C32
                                                                                                                                                                                                                                                                                                                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00828C57
                                                                                                                                                                                                                                                                                                                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00828C5F
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2832842796-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 85174aefddc13033c5e73c3d942dc3d43c797bceca479febf244adafcf93a799
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fa45f049807b4b4658e5e3b8ac8dea22e9d34fc12c947db5d23689723375dc57
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 85174aefddc13033c5e73c3d942dc3d43c797bceca479febf244adafcf93a799
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 75514A35A00215EFCB15DF64C885EA9BBF5FF49314F088498E849AB362DB35ED51CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00838F40
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00838FD0
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00838FEC
                                                                                                                                                                                                                                                                                                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00839032
                                                                                                                                                                                                                                                                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00839052
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00821043,?,7556E610), ref: 007CF6E6
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0080FA64,00000000,00000000,?,?,00821043,?,7556E610,?,0080FA64), ref: 007CF70D
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 666041331-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 60b51738f433137863be13f074e00037ba21b3dfdb835d238feef0e5b49281e2
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a0350f6636dbbd63f69f6436dd1a36ffdc0ec5de9dcb23ca5d10eb111f0f1044
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 60b51738f433137863be13f074e00037ba21b3dfdb835d238feef0e5b49281e2
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FE514834605205DFCB14DF68C4989ADBBF1FF89314F0480A8E90AAB362DB75ED85CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00846C33
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00846C4A
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00846C73
                                                                                                                                                                                                                                                                                                                                                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0082AB79,00000000,00000000), ref: 00846C98
                                                                                                                                                                                                                                                                                                                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00846CC7
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3688381893-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0bd301e41e89acbcd5a0d1cf7fe45fc9cea840b2b52f67f29b0494202971e972
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bf290d726349df6672adf69598dc108a22ab4fab9ab384f58dcfef6a0b400646
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0bd301e41e89acbcd5a0d1cf7fe45fc9cea840b2b52f67f29b0494202971e972
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: EB41D935A0410CAFD724CF68CC98FA57BA9FB0B364F150258F895D72E0E771AD61DA41
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 269201875-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0eb78f96a2d8b70f85663c875dd3ea4a588c74c1f7e835f28c071646dbfae687
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a2ace22b2959035da55e73dfb98ff87d8fb33481e20233f5ce4637c4b0a496d2
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0eb78f96a2d8b70f85663c875dd3ea4a588c74c1f7e835f28c071646dbfae687
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FB41E232A01204DFCB24DF79C885A5DB3B9EF89310F1545ADE515EB392EA35EE02CB80
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCursorPos.USER32(?), ref: 007C9141
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(00000000,?), ref: 007C915E
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(00000001), ref: 007C9183
                                                                                                                                                                                                                                                                                                                                                        • GetAsyncKeyState.USER32(00000002), ref: 007C919D
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4210589936-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c7a1f87ea00286cef786fa22f82dcbcdb86e55a9ef9ba07dfde3bf59a246bcbc
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 53753f3889a0405dc13dd51329f2ab2f2b46feab1224bd42bfdc1a860809580f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c7a1f87ea00286cef786fa22f82dcbcdb86e55a9ef9ba07dfde3bf59a246bcbc
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0C416C31A0860AFBDF559F68C849BEEB774FB05324F248229E529A32E0C7346950CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetInputState.USER32 ref: 008238CB
                                                                                                                                                                                                                                                                                                                                                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00823922
                                                                                                                                                                                                                                                                                                                                                        • TranslateMessage.USER32(?), ref: 0082394B
                                                                                                                                                                                                                                                                                                                                                        • DispatchMessageW.USER32(?), ref: 00823955
                                                                                                                                                                                                                                                                                                                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00823966
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2256411358-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4894f866e29422d1f4e86404c3d0eb82b22f019ffc277909dcf7b52d18bac3a0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 83b34daef70e1c388b4c92db7a439930e9093cfff362392c97868da0fd45ed9a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4894f866e29422d1f4e86404c3d0eb82b22f019ffc277909dcf7b52d18bac3a0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6831C6709043659EEF25CB38A869BB67FACFB07304F04056DE462D65A0E7BCA6C5CB11
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0082C21E,00000000), ref: 0082CF38
                                                                                                                                                                                                                                                                                                                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 0082CF6F
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,00000000,?,?,?,0082C21E,00000000), ref: 0082CFB4
                                                                                                                                                                                                                                                                                                                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0082C21E,00000000), ref: 0082CFC8
                                                                                                                                                                                                                                                                                                                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0082C21E,00000000), ref: 0082CFF2
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3191363074-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4101f05bc9bef8b04cb31701f682e2626987dc3601f44185d5e31de2c06d7a4e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bc3f59297ca6893e6a1530d6481a83bac904f5691e828558d9d1594bb90b8d49
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4101f05bc9bef8b04cb31701f682e2626987dc3601f44185d5e31de2c06d7a4e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 12314C71600615EFDB20DFA5E984ABFBBFAFB15354B10442EF516D2150DBB0AE80DB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00811915
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 008119C1
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000,?,?,?), ref: 008119C9
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 008119DA
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 008119E2
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3382505437-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9ac17af2adc12d955f4c2c8da24d0e2a6d1db0afabe856773213eb118223bd26
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 53003239f63097f18dc77db06ff1d4ddf5325693e3a1fbcb74e5d9ae406b500b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9ac17af2adc12d955f4c2c8da24d0e2a6d1db0afabe856773213eb118223bd26
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 40318A75A00219AFCB00CFA8C999ADE3BB9FF05315F108229FA21E72D1C7709984CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00845745
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 0084579D
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008457AF
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008457BA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00845816
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 763830540-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1dd6da03817f53a8a0e6af1bad776a351c0ddc6e953d428ac5c19a5d563f32e6
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fa9c51b16bf1c031e6374f46f664e51548d8e4c4e0cd00c7353d73df8f0b3b50
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1dd6da03817f53a8a0e6af1bad776a351c0ddc6e953d428ac5c19a5d563f32e6
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7C21A57590461CEBDB209F64CC85AEE7BBCFF15328F108226E929EA181D7709985CF50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(00000008), ref: 007C98CC
                                                                                                                                                                                                                                                                                                                                                        • SetTextColor.GDI32(?,?), ref: 007C98D6
                                                                                                                                                                                                                                                                                                                                                        • SetBkMode.GDI32(?,00000001), ref: 007C98E9
                                                                                                                                                                                                                                                                                                                                                        • GetStockObject.GDI32(00000005), ref: 007C98F1
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000EB), ref: 007C9952
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Color$LongModeObjectStockTextWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1860813098-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c4ed082e7e131905690d74d6f5a63ff9b4ed92afd4dc3dd7b5dcfad2ffd47669
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 459d8688670ddd7a197c83ef38b021c48ac8ab32e0af3e4620f31a56cfac5fce
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c4ed082e7e131905690d74d6f5a63ff9b4ed92afd4dc3dd7b5dcfad2ffd47669
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DA2147314462909FCBA24F34EC5CFE53FA4AF67321F09018EE6928B1E2D7396941CB10
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • IsWindow.USER32(00000000), ref: 00830951
                                                                                                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32 ref: 00830968
                                                                                                                                                                                                                                                                                                                                                        • GetDC.USER32(00000000), ref: 008309A4
                                                                                                                                                                                                                                                                                                                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 008309B0
                                                                                                                                                                                                                                                                                                                                                        • ReleaseDC.USER32(00000000,00000003), ref: 008309E8
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4156661090-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: fad088969bae27dec0015164babe6d7ddea8e4be3ed3f0492359b1ebcb207726
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0aeea945fbd0d7a8874ef899441b9a99aabc184ccc356da6eecc438e4b021767
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fad088969bae27dec0015164babe6d7ddea8e4be3ed3f0492359b1ebcb207726
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A0219239A00214AFD714EF68D848AAEBBE9FF49700F04806DE846D7362CB74AD44CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 007ECDC6
                                                                                                                                                                                                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007ECDE9
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E3820: RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                                                                                                                                                                                                                                                                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 007ECE0F
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ECE22
                                                                                                                                                                                                                                                                                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007ECE31
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 336800556-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 33aceb5797cb3254fc29298eab8c0a9a4fcdae383b1d93a68b22f95d3662e208
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3f4d337ff001e79b0e2f16a6c807ff4035643e2d2ce196f07aea564aa84c5f84
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 33aceb5797cb3254fc29298eab8c0a9a4fcdae383b1d93a68b22f95d3662e208
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 8E01847A6032957F23261ABB6C8DD7B796DEECBBA1315012DF905D7201EA698D0381B0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007C9693
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(?,00000000), ref: 007C96A2
                                                                                                                                                                                                                                                                                                                                                        • BeginPath.GDI32(?), ref: 007C96B9
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(?,00000000), ref: 007C96E2
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3225163088-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: b42091aa466ea46f667b2776bdd57513d1511fca4c010dcca144438f9a1a5a80
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1c4e9ed553ffd97d0fef64e10dfb18dad075f3b0158eb04e6aff39dba5337549
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b42091aa466ea46f667b2776bdd57513d1511fca4c010dcca144438f9a1a5a80
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 58215B30802305EBDF519F68EC1CBA97FACBB51765F50421EF910A61F0DB78A892CB94
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _memcmp
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2931989736-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c7d7e5386ca98366bc7bcdfea1c093dc8d2f8b73e55b4e78a695707d4bc12b90
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 25413c5e84caaaa0e60dcf7b542649df44b55df32e25dd2d924a241bb88e8c26
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c7d7e5386ca98366bc7bcdfea1c093dc8d2f8b73e55b4e78a695707d4bc12b90
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 550192A564161DFAE20855109D83EFA635CFFA13A8B404425FE14DA382F664ED9086A0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,?,?,007DF2DE,007E3863,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6), ref: 007E2DFD
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2E32
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2E59
                                                                                                                                                                                                                                                                                                                                                        • SetLastError.KERNEL32(00000000,007B1129), ref: 007E2E66
                                                                                                                                                                                                                                                                                                                                                        • SetLastError.KERNEL32(00000000,007B1129), ref: 007E2E6F
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorLast$_free
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3170660625-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: df45c3b02200e14756d5238aba1600b52b08895b55219034174a70bf49f27482
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 521cf5eebcaeb6d580a6a3d346326abb610d3a6f98020daf690945c2b78d19fc
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: df45c3b02200e14756d5238aba1600b52b08895b55219034174a70bf49f27482
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3001F436207690A7C61227776C4ED2B265DBBCE7A5B214028F425E32A3EA2CCC034520
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?,?,0081035E), ref: 0081002B
                                                                                                                                                                                                                                                                                                                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810046
                                                                                                                                                                                                                                                                                                                                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810054
                                                                                                                                                                                                                                                                                                                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?), ref: 00810064
                                                                                                                                                                                                                                                                                                                                                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0080FF41,80070057,?,?), ref: 00810070
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3897988419-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 96e983b06c80bb4208fd40589a61af3a1b8881d834301e66dc24c616ca5249da
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 64bdcb67ccf686346d9b879e84e4b9dc447b9c5ab1003b6c487e764d4845096f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 96e983b06c80bb4208fd40589a61af3a1b8881d834301e66dc24c616ca5249da
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: BE018F7A601608BFDB504F68DC04BEA7AADFF48791F144124F905D2211E7B1DE80CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0081E997
                                                                                                                                                                                                                                                                                                                                                        • QueryPerformanceFrequency.KERNEL32(?), ref: 0081E9A5
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000), ref: 0081E9AD
                                                                                                                                                                                                                                                                                                                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0081E9B7
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32 ref: 0081E9F3
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2833360925-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 5231acbe761e7f8d81d2d6ec7d405eb1b813db9adbe56b3f7e54c47b760429ce
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: edec36c4912ebf244bc602849d9cdb259264adeb50844a12292837b97211c565
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5231acbe761e7f8d81d2d6ec7d405eb1b813db9adbe56b3f7e54c47b760429ce
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9201203580262DDBCF40ABA4D849AEDBF7CFF0A700F000546E902B2241DB309690CBA2
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00811114
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811120
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 0081112F
                                                                                                                                                                                                                                                                                                                                                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00810B9B,?,?,?), ref: 00811136
                                                                                                                                                                                                                                                                                                                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0081114D
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 842720411-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: cb6f4c165fb0fb4777619a384924a86f03e72a424da3677912162897220db374
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4948babb6b55032bf9debff093acc5b7f3d2f3789d98eebd645afd4b7d59864a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: cb6f4c165fb0fb4777619a384924a86f03e72a424da3677912162897220db374
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 37011D79101205BFDB514FA5DC4DAAA7B6EFF86364B104419FA45D7360DA31DC40DA60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00810FCA
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00810FD6
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00810FE5
                                                                                                                                                                                                                                                                                                                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00810FEC
                                                                                                                                                                                                                                                                                                                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00811002
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 44706859-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 567998ea6ecc569b2c923c110b2fb9ce9f7666ecd1e892198d061c37184415d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ccb2c210ecf68ee371e23e2ba8fff4d4b211dd63b5159a1e00ef72f49331ce83
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 567998ea6ecc569b2c923c110b2fb9ce9f7666ecd1e892198d061c37184415d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 62F06D39602701EBDB214FA4DC4DF963BADFF8ABA2F104415FA45C7251CA70DC80CA60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0081102A
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00811036
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00811045
                                                                                                                                                                                                                                                                                                                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0081104C
                                                                                                                                                                                                                                                                                                                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00811062
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 44706859-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7fe515ebbb15722272c67178beac765ac5fc3883313d04f2c9e8ba271953a579
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2bcc944d465dc3453d9a31218299b08047f1b907c3da8dc3b30b59fb1ac4fd26
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7fe515ebbb15722272c67178beac765ac5fc3883313d04f2c9e8ba271953a579
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4CF06D39602701EBDB219FA5EC4DF963BADFF8A761F100415FA45C7250CA70D880CA60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 00820324
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 00820331
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 0082033E
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 0082034B
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 00820358
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(?,?,?,?,0082017D,?,008232FC,?,00000001,007F2592,?), ref: 00820365
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CloseHandle
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2962429428-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: df780eb3b1c922f1286d6ed0b8409bec9e61ab02a9f457bb54375860e4e4e8bd
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0c63a696e60e79dc9cb794e17bf8f878aa9cfbcbd47e62372855c1293170ac94
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: df780eb3b1c922f1286d6ed0b8409bec9e61ab02a9f457bb54375860e4e4e8bd
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B101A272801B259FC7309F66E880412FBF9FF503153158A3FD19692A32C371A994CF80
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED752
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: HeapFree.KERNEL32(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED764
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED776
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED788
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007ED79A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: b69ccbe27691a6ec38b43fee12e742f1ca277f1da36e9e5f952b85330fe1c2ec
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bd6ebfb9ac73924f51d1c557277c2270fc09ce7cbed4464583d9af027d63b1f6
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b69ccbe27691a6ec38b43fee12e742f1ca277f1da36e9e5f952b85330fe1c2ec
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D7F01232546288AB8671EB66F9CAC1A7BDDBB4C710B951819F058E7517C73CFCC08A64
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetDlgItem.USER32(?,000003E9), ref: 00815C58
                                                                                                                                                                                                                                                                                                                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00815C6F
                                                                                                                                                                                                                                                                                                                                                        • MessageBeep.USER32(00000000), ref: 00815C87
                                                                                                                                                                                                                                                                                                                                                        • KillTimer.USER32(?,0000040A), ref: 00815CA3
                                                                                                                                                                                                                                                                                                                                                        • EndDialog.USER32(?,00000001), ref: 00815CBD
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3741023627-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 16a0ae5c4d2fb85fe2779daa1bf284a94340040d0ceeb1ee761a69c692672ea0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 627e3dc209650ed2377011df1c5101c19bfdd2a64e2d2a11bb0c088bb66bd2da
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 16a0ae5c4d2fb85fe2779daa1bf284a94340040d0ceeb1ee761a69c692672ea0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D6016D74501B04EBEB205F50DD5EFE677BCFF51B05F010559A692A10E1DBF4AA84CA90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E22BE
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: HeapFree.KERNEL32(00000000,00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000), ref: 007E29DE
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E29C8: GetLastError.KERNEL32(00000000,?,007ED7D1,00000000,00000000,00000000,00000000,?,007ED7F8,00000000,00000007,00000000,?,007EDBF5,00000000,00000000), ref: 007E29F0
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E22D0
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E22E3
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E22F4
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E2305
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 776569668-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 472bfd149c02a6b76c73b535e97fe7867db6861468b3eff27b41f24d0901512c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: cd97b96eb10b8c821550071798ada21c1691fc384d3c32d3a7ed59b2041cd924
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 472bfd149c02a6b76c73b535e97fe7867db6861468b3eff27b41f24d0901512c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1CF030714021548B8A22AF59BC0A8083B6CFB1C760702551AF514E72B7CB3854539FA5
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • EndPath.GDI32(?), ref: 007C95D4
                                                                                                                                                                                                                                                                                                                                                        • StrokeAndFillPath.GDI32(?,?,008071F7,00000000,?,?,?), ref: 007C95F0
                                                                                                                                                                                                                                                                                                                                                        • SelectObject.GDI32(?,00000000), ref: 007C9603
                                                                                                                                                                                                                                                                                                                                                        • DeleteObject.GDI32 ref: 007C9616
                                                                                                                                                                                                                                                                                                                                                        • StrokePath.GDI32(?), ref: 007C9631
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2625713937-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6eb0c816d0a68dbc80c67721d84fa3572191dbeab04b35dca851d55096734527
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1e9463c47b0783279e18cc86912bea91b78c9048441a6df0216494a48cf85610
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6eb0c816d0a68dbc80c67721d84fa3572191dbeab04b35dca851d55096734527
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C7F04934006A08EBDFA65F69ED1CBA43F69BB02322F448218F525650F0DB3499A2DF20
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: __freea$_free
                                                                                                                                                                                                                                                                                                                                                        • String ID: a/p$am/pm
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 98798344badbd48bda0d0f144e126e0b5095605fee537814fbbcf2a6dcf91ed8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3db4e4a99945eb99a5924fc0ee9c9661e8a8a4c076818f38f0d67e60aeb86a7a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 98798344badbd48bda0d0f144e126e0b5095605fee537814fbbcf2a6dcf91ed8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2DD11771A02285CACB249F6AC85BBFEB7B5FF0E300FA44159E6019B654D37D9D80CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D0242: EnterCriticalSection.KERNEL32(0088070C,00881884,?,?,007C198B,00882518,?,?,?,007B12F9,00000000), ref: 007D024D
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D0242: LeaveCriticalSection.KERNEL32(0088070C,?,007C198B,00882518,?,?,?,007B12F9,00000000), ref: 007D028A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D00A3: __onexit.LIBCMT ref: 007D00A9
                                                                                                                                                                                                                                                                                                                                                        • __Init_thread_footer.LIBCMT ref: 00837BFB
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D01F8: EnterCriticalSection.KERNEL32(0088070C,?,?,007C8747,00882514), ref: 007D0202
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D01F8: LeaveCriticalSection.KERNEL32(0088070C,?,007C8747,00882514), ref: 007D0235
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: 5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 535116098-3733170431
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 34d550e247ffb9b0be94b1df552bd97a20c8fb0163935e68a365d72f0d9c1c22
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6cad68b10ba1a0657eed0d5186ee161fd164dd21ed18c516b8b9852417ea3775
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 34d550e247ffb9b0be94b1df552bd97a20c8fb0163935e68a365d72f0d9c1c22
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 65917CB0A04209EFCB24EF98D8959ADB7B1FF85304F108059F806DB292DB75EE45CB91
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID: JO{
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-846867066
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: db4b4780b453edcbef913ad2e4f8ff9962b886cba1727ce5e0cb94b67ae62a1b
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 79a090f00dfc20f44a4340e164f320a29d4891ace195dfdb7bcb15e5fb5ce256
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: db4b4780b453edcbef913ad2e4f8ff9962b886cba1727ce5e0cb94b67ae62a1b
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: AD51D771D0268EDFCB119FA6C849FAE7BB4BF0D318F14005AF405A72A2D6799901CB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 007E8B6E
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 007E8B7A
                                                                                                                                                                                                                                                                                                                                                        • __dosmaperr.LIBCMT ref: 007E8B81
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                                                                                                                                                                                                                                                                                                        • String ID: .}
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2434981716-2266125135
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: d46a6e18b7d10b955ebdf18155fa8791c0d367eb3b81288f56b547a0cad9b8e8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2bd3054b87ab96cd1e0d88641f715f099e9ff838e6c2bbe03631b14d30f6a939
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: d46a6e18b7d10b955ebdf18155fa8791c0d367eb3b81288f56b547a0cad9b8e8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F8417EF06051C5AFC7659F5AC880A7D7FA6EF8D304B1881AAF45D8B242DE35CC02C751
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008121D0,?,?,00000034,00000800,?,00000034), ref: 0081B42D
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00812760
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008121FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0081B3F8
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0081B355
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00812194,00000034,?,?,00001004,00000000,00000000), ref: 0081B365
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00812194,00000034,?,?,00001004,00000000,00000000), ref: 0081B37B
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008127CD
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0081281A
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                                                                                                                                                        • String ID: @
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1cf53c891e77df89c195903dfc5316426fe48ed5dadcc877db4e6a7f0bf23a84
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 667b42cc3c2581723e5112010567061f9352b72673e8ad9c43916afa68b1c857
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1cf53c891e77df89c195903dfc5316426fe48ed5dadcc877db4e6a7f0bf23a84
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 63410E76900218AFDB10DFA8CD85ADEBBB8FF09700F108099FA55B7181DB706E95CB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 007E1769
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E1834
                                                                                                                                                                                                                                                                                                                                                        • _free.LIBCMT ref: 007E183E
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free$FileModuleName
                                                                                                                                                                                                                                                                                                                                                        • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2506810119-1505163051
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c60b4b2e19d71f017cd5cf9c9ca7eb3fb29e52fa69ab0629d7c72ab802417951
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a0fd80694d2f3a71f29ce4c1abd4ed44b8140ca84823a14b1729bd03d08485c0
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c60b4b2e19d71f017cd5cf9c9ca7eb3fb29e52fa69ab0629d7c72ab802417951
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9931C271A01298EFCB21DB9A9C8AD9EBBFCEF89720B504166F404D7211D7749E41CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0081C306
                                                                                                                                                                                                                                                                                                                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 0081C34C
                                                                                                                                                                                                                                                                                                                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00881990,01475418), ref: 0081C395
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 135850232-4108050209
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c313f3190f4823057509d40e889098223ec995e6ca8d8f40c877ca769163f721
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 4a42474d967ae21da25cfcc707abacc5cb04267dab61fcf0dce14183c7c1ebaa
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c313f3190f4823057509d40e889098223ec995e6ca8d8f40c877ca769163f721
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5341AD312443019FD724DF29D884B9ABBE8FF85324F008A1EF9A5D7391D730A985CB62
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0084CC08,00000000,?,?,?,?), ref: 008444AA
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32 ref: 008444C7
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008444D7
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$Long
                                                                                                                                                                                                                                                                                                                                                        • String ID: SysTreeView32
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 847901565-1698111956
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 52808132590bf9e2a57b25bb5eced0ced1c14ba158a16bd354e300b9e096eed3
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 678c2a2f8208d07a7f7510120fe2889aac02b48f39ad2e0540155f51894a3524
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 52808132590bf9e2a57b25bb5eced0ced1c14ba158a16bd354e300b9e096eed3
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: B7319C32201209ABDF209E38DC45BEA7BA9FB08334F219329F979E21D0D774EC509B50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0083335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00833077,?,?), ref: 00833378
                                                                                                                                                                                                                                                                                                                                                        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0083307A
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0083309B
                                                                                                                                                                                                                                                                                                                                                        • htons.WSOCK32(00000000,?,?,00000000), ref: 00833106
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                                                                                                                                                        • String ID: 255.255.255.255
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 946324512-2422070025
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 43439361629196dba8ee1a38035ea421ab47a523dacf2b87cfc29215e0f4e42c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1c35f26416379ed4bb949ce7da4d8c9fa5caf21feb0274e9bbfe3d4d2330df1b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 43439361629196dba8ee1a38035ea421ab47a523dacf2b87cfc29215e0f4e42c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4031B039604605DFCB24CF68C595AAA77E0FF94318F248059E915CB3A2DB72EE45C7A0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00843F40
                                                                                                                                                                                                                                                                                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00843F54
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00843F78
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$Window
                                                                                                                                                                                                                                                                                                                                                        • String ID: SysMonthCal32
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 85439976975d445f7486fb9a8b411f8c13875e0c0f436af981f40ef5680dba5f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 44d0af4b02267bb7c0b32a61af1e5b3b1c41195c778b067b962fa4f5c5e83f2d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 85439976975d445f7486fb9a8b411f8c13875e0c0f436af981f40ef5680dba5f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2321BC32600219BBDF219F94DC46FEA3B79FF48728F110214FE15AB1D0DAB5A854CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00844705
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00844713
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0084471A
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: msctls_updown32
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1665c2315baae876d40db1625875509403ae9e949d2281dab25a0b37a9c37495
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a576bc07c0e531e035fb7637e39ad36ca8bf837efffc3141a1335f1b97ab0764
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1665c2315baae876d40db1625875509403ae9e949d2281dab25a0b37a9c37495
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 93214CB560020DAFEB10DF68DC85EA737ADFB5A394B050059FA15DB351CB34EC12CA60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 176396367-2734436370
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: b24f11fa846df4a1b3d26d18797bcc5f82a6f4d05c1df4551e974a46e1c8c8b4
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c6fd24059aa02734bf3c7c14bc548ab0e3f2c20839342834fe7621f9b4ea49f3
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b24f11fa846df4a1b3d26d18797bcc5f82a6f4d05c1df4551e974a46e1c8c8b4
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 74215B32104514A6D331AB24DC26FF773EDFFA1314F50402AF99AE7142EB59ADC1C2A5
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00843840
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00843850
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00843876
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: Listbox
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f29e4770825a1aaa6f1549ae238ac7c92cf446dcfe312e45bf2ceb6e67f85814
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2ca54342396679de7e0696ffc64cd80124c3b7fb04e23d79aa855f5d3a1e9d10
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f29e4770825a1aaa6f1549ae238ac7c92cf446dcfe312e45bf2ceb6e67f85814
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5C21BE7260021CBBEF219F54CC85FAB7B6EFF89764F108124F9449B190CA75DC5287A0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000001), ref: 00824A08
                                                                                                                                                                                                                                                                                                                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00824A5C
                                                                                                                                                                                                                                                                                                                                                        • SetErrorMode.KERNEL32(00000000,?,?,0084CC08), ref: 00824AD0
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                                                                                                                                                        • String ID: %lu
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2507767853-685833217
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 230fdffe052b330e5cb6c6c4761f7ac9f27bea84096d0347f6a16eb042cc4470
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a5bb1de06864e3dba977b6e363c4ab67559932025201e3dba44c93468f5fd2ec
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 230fdffe052b330e5cb6c6c4761f7ac9f27bea84096d0347f6a16eb042cc4470
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1F313E75A00219EFDB10DF64C885EAA7BF8FF09308F1480A9E909DB252D775EE45CB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0084424F
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00844264
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00844271
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                        • String ID: msctls_trackbar32
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 52fa0a5feae4908afdc35cd9b845dcb3983bb6329d7fb6f835eda5ee8b94b8af
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fd4c9d430e0483fbc0d19a81c24f16447997f07d4de477dfa704de68f15cdca4
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 52fa0a5feae4908afdc35cd9b845dcb3983bb6329d7fb6f835eda5ee8b94b8af
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: F811A03124024CBEEF205E69CC06FAB3BACFF95B64F114624FA55E60A0D6B1D8519B20
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B6B57: _wcslen.LIBCMT ref: 007B6B6A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00812DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00812DC5
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00812DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00812DD6
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00812DA7: GetCurrentThreadId.KERNEL32 ref: 00812DDD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00812DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00812DE4
                                                                                                                                                                                                                                                                                                                                                        • GetFocus.USER32 ref: 00812F78
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00812DEE: GetParent.USER32(00000000), ref: 00812DF9
                                                                                                                                                                                                                                                                                                                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00812FC3
                                                                                                                                                                                                                                                                                                                                                        • EnumChildWindows.USER32(?,0081303B), ref: 00812FEB
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: %s%d
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7605e713fbe674ab2f0055302b50a4e49f4aff4dfee9a38fcc9cb182caac3481
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6d864dc5c5774d7c430060042c3e1e0f4e23c3d1d4aab316c091cbe00412f79b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7605e713fbe674ab2f0055302b50a4e49f4aff4dfee9a38fcc9cb182caac3481
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0811C0B5200209ABCF446F64DC99FEE37AEFF98304F048079B909DB252DE3499858B70
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008458C1
                                                                                                                                                                                                                                                                                                                                                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008458EE
                                                                                                                                                                                                                                                                                                                                                        • DrawMenuBar.USER32(?), ref: 008458FD
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                                                                                                                                                        • String ID: 0
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 524baab536ef4b23e5035dc1e4346075572e79914686e47f72b029f046ebf28f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 7aceac91597fe60d071b630399a89228b7d90c313046ff354b747c3d9f79646c
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 524baab536ef4b23e5035dc1e4346075572e79914686e47f72b029f046ebf28f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DE016D3150121CEFDB619F11EC48BAEBFB9FB45764F108099E849DA152EB348A84EF21
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f7d1563dfdedfb384480aa6b12b83faa3fe602aea29808be2f7e8236cb936180
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a866da967c318a4f187228eb2b4e7c0d2a871cc6cb3fb0c5c370d03d6d2ce90d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f7d1563dfdedfb384480aa6b12b83faa3fe602aea29808be2f7e8236cb936180
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 86C13A75A0020AEFDB15CFA8C894AAEB7B9FF48704F208598E515EB251D771EDC1CB90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1998397398-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 75b7353d982eb1e510f8e53a2ef54d8a8db8d23973a5207a08eea0dae982b883
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 92ce67a49cefdf139c223b5cde8093c237f6fd10137c43dda0d27d38cd258d19
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 75b7353d982eb1e510f8e53a2ef54d8a8db8d23973a5207a08eea0dae982b883
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 23A10575604200DFC714DF28C58AA6AB7E5FF89714F048859F98ADB362DB34EE41CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0084FC08,?), ref: 008105F0
                                                                                                                                                                                                                                                                                                                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0084FC08,?), ref: 00810608
                                                                                                                                                                                                                                                                                                                                                        • CLSIDFromProgID.OLE32(?,?,00000000,0084CC40,000000FF,?,00000000,00000800,00000000,?,0084FC08,?), ref: 0081062D
                                                                                                                                                                                                                                                                                                                                                        • _memcmp.LIBVCRUNTIME ref: 0081064E
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 314563124-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c65a2eaed473acbcabbf1b14353dca9d19b167a6e3a89d09569248e735c725f5
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6dc64e35e544a9c4072dd6513a524f173a7db8d840d7a988e65c304a5456cd02
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c65a2eaed473acbcabbf1b14353dca9d19b167a6e3a89d09569248e735c725f5
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2481B775A00209EFCB04DF94C984AEEB7B9FF89315F204558E516EB250DB71AE86CF60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0083A6AC
                                                                                                                                                                                                                                                                                                                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0083A6BA
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0083A79C
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0083A7AB
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,007F3303,?), ref: 007CCE8A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1991900642-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 771bec8836e8bba46e3356aa3ea86fee588db9d9079da85440cb71f3a9eb1574
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: f8582203b07980ea2a3d63e398105691cbf7a9e247aae5b9f8a1441f5ff7c530
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 771bec8836e8bba46e3356aa3ea86fee588db9d9079da85440cb71f3a9eb1574
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2E51F975508300AFD714EF24C88AAABBBE8FF89754F40892DF695D7251EB34D904CB92
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _free
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 269201875-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 32fa48d7415a19909b8190b49d30b651249d8c61a608c21a9ee576cc2183b6e4
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: f3aa2bdd580eb7ddab53caec05328eafaf2aee629d84bff199b61a06b2966724
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 32fa48d7415a19909b8190b49d30b651249d8c61a608c21a9ee576cc2183b6e4
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C441313250018CEBDB256BFD9C496BE3AB4FF85370F544226F619D7392E63C48415671
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 008462E2
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00846315
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00846382
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3880355969-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 2828b9dcdc0ff39fcd2a647ef75036aed9943d27a0681dfa6a50cc024acf4ee1
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bb55c95fea430547b117a4c240ea1e73ca96b1ca5a051c331e0bd50b3f548383
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 2828b9dcdc0ff39fcd2a647ef75036aed9943d27a0681dfa6a50cc024acf4ee1
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0A513A74A00249EFCF14DF68D884AAE7BB5FB46364F108259F815DB290E770ED91CB51
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00831AFD
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 00831B0B
                                                                                                                                                                                                                                                                                                                                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00831B8A
                                                                                                                                                                                                                                                                                                                                                        • WSAGetLastError.WSOCK32 ref: 00831B94
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorLast$socket
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1881357543-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 6665deaf2a74a8f154abda4d0dcd73083c38112c0f1c769ecec0018287a561a9
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: edd746a5e746f2c5cc8df41684abfb45bdde96bb1e0a2ce7b018a806f65d2597
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 6665deaf2a74a8f154abda4d0dcd73083c38112c0f1c769ecec0018287a561a9
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0E419035600200AFEB20AF24C88AF6677E5EB85718F54849CFA1A9F2D2D776DD41CBD0
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9108068d1149ba4d5a2882e77cbfdcb03d7c964b29cede1f05f572c0f4e29ca0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 17ec7b6c3e38fc777425bb7cecab36a53ab7f859e837c94d787e9d951dba0b42
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9108068d1149ba4d5a2882e77cbfdcb03d7c964b29cede1f05f572c0f4e29ca0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2741E4B2A01384EFD7249F79CC45B6BBFA9EB8D710F10452AF542DB2C2D779A9118780
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00825783
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,00000000), ref: 008257A9
                                                                                                                                                                                                                                                                                                                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008257CE
                                                                                                                                                                                                                                                                                                                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008257FA
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3321077145-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 98d15047776dfd438f62c5f904add460fbdc1dd46be7705f111a0fc12e407fe0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c7ba3682f19bdefb39a0457eb554ffafce1564d766c87f88b9f208be4261ab9e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 98d15047776dfd438f62c5f904add460fbdc1dd46be7705f111a0fc12e407fe0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 58412B39600610DFCB25DF15C445A5EBBE6FF89320B18C498E84AAB762CB74FD40CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,007D6D71,00000000,00000000,007D82D9,?,007D82D9,?,00000001,007D6D71,?,00000001,007D82D9,007D82D9), ref: 007ED910
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007ED999
                                                                                                                                                                                                                                                                                                                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 007ED9AB
                                                                                                                                                                                                                                                                                                                                                        • __freea.LIBCMT ref: 007ED9B4
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007E3820: RtlAllocateHeap.NTDLL(00000000,?,00881444,?,007CFDF5,?,?,007BA976,00000010,00881440,007B13FC,?,007B13C6,?,007B1129), ref: 007E3852
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2652629310-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a8d5c3998b6dea91c73d238f89002388254ce34ab4ff39e2401e3b881ae8f801
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 62d11487300ae86361eefad162754f9d9428c169aa3a29dc2cd312f2552c3e88
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a8d5c3998b6dea91c73d238f89002388254ce34ab4ff39e2401e3b881ae8f801
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: AD31FE72A0124AABDF24CF66DC45EAE7BA5EF45310F054169FC04DB252EB39ED50CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00845352
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00845375
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00845382
                                                                                                                                                                                                                                                                                                                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008453A8
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3340791633-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e62ed31fd5d1e050d23eba2cf42c4e8730d469434b17556289a5c05035504dc3
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 1155d0d8da569597d5be3e2e3f786d0f05c4c3c0c44215608415496398a0ba32
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e62ed31fd5d1e050d23eba2cf42c4e8730d469434b17556289a5c05035504dc3
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: D7319E34A55A0CEFEB209E14CC19BED77A5FB06394F584145FA11D63E2C7B49D40DB41
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetKeyboardState.USER32(?,7608C0D0,?,00008000), ref: 0081ABF1
                                                                                                                                                                                                                                                                                                                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 0081AC0D
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 0081AC74
                                                                                                                                                                                                                                                                                                                                                        • SendInput.USER32(00000001,?,0000001C,7608C0D0,?,00008000), ref: 0081ACC6
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 432972143-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 32992018e734a913a8e53b8ba64cb2e32f1250e21b4bcc7aea413c9b6f1279a0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6f33f02a91c2618ca841ad655a6c3c4291f9daa839fc37c28b1edfc861fe1440
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 32992018e734a913a8e53b8ba64cb2e32f1250e21b4bcc7aea413c9b6f1279a0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1E31F270A02618AFEB39CB69C8047FA7BAEFF89310F04421AE485D22D1D37589C587D2
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • ClientToScreen.USER32(?,?), ref: 0084769A
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00847710
                                                                                                                                                                                                                                                                                                                                                        • PtInRect.USER32(?,?,00848B89), ref: 00847720
                                                                                                                                                                                                                                                                                                                                                        • MessageBeep.USER32(00000000), ref: 0084778C
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1352109105-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: ee4ace036fc9b6b76380c39d2c90543b1b0013ae8466de1f196d4961695f139d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2192f2049da4cba4b1fbd9aed070848eecea182820d74dfd39f7364943461e58
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ee4ace036fc9b6b76380c39d2c90543b1b0013ae8466de1f196d4961695f139d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3F41A038605259DFDB11CF58C898EA9BBF9FF49314F9680A9E414DB261C730E942CF90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32 ref: 008416EB
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00813A57
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813A3D: GetCurrentThreadId.KERNEL32 ref: 00813A5E
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008125B3), ref: 00813A65
                                                                                                                                                                                                                                                                                                                                                        • GetCaretPos.USER32(?), ref: 008416FF
                                                                                                                                                                                                                                                                                                                                                        • ClientToScreen.USER32(00000000,?), ref: 0084174C
                                                                                                                                                                                                                                                                                                                                                        • GetForegroundWindow.USER32 ref: 00841752
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2759813231-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a91f512321ac22e7cbdf84f4e58311c564d3f0978e94eedf9e6c75f0ef576d72
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0b8d8c4da40f51820a425779c94815b291c13322725b086a4ab5455a2d8e6567
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a91f512321ac22e7cbdf84f4e58311c564d3f0978e94eedf9e6c75f0ef576d72
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 28313D75D00149AFCB04EFA9C8859EEBBFDFF48304B5480AAE415E7211D6359E45CBA1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0081DFCB
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0081DFE2
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0081E00D
                                                                                                                                                                                                                                                                                                                                                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0081E018
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3763101759-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 09f8076e04ccaad828ecd3cbda52b69038beff06226a2a52bf5af3f5afcc3680
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ff5705144ecf747d79a906bb6658590d888e378fda7c29b0378acbda2546a94a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 09f8076e04ccaad828ecd3cbda52b69038beff06226a2a52bf5af3f5afcc3680
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9921BF71900614EFCB209FA8D881BAEB7F8FF49750F144069E805FB342D6749E41CBA1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                        • GetCursorPos.USER32(?), ref: 00849001
                                                                                                                                                                                                                                                                                                                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00807711,?,?,?,?,?), ref: 00849016
                                                                                                                                                                                                                                                                                                                                                        • GetCursorPos.USER32(?), ref: 0084905E
                                                                                                                                                                                                                                                                                                                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00807711,?,?,?), ref: 00849094
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2864067406-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9c3dc55b092400d9bd754e59ab5f6aa56974abd71316e4b1acb6b22b8b7d18a7
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 895513a63db2c0a3cc037b4a17a9b0046352f141bfd8e24ea4f8b01b62a8e786
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9c3dc55b092400d9bd754e59ab5f6aa56974abd71316e4b1acb6b22b8b7d18a7
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9F21AB35601418EFDB25CF98CC58EEB7BB9FB8A350F014069F9458B261C735A990DB60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetFileAttributesW.KERNEL32(?,0084CB68), ref: 0081D2FB
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 0081D30A
                                                                                                                                                                                                                                                                                                                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0081D319
                                                                                                                                                                                                                                                                                                                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0084CB68), ref: 0081D376
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2267087916-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 8b54ba8a630571cf7ead8ff8fb40e39efc4b37852b22a00fb85a8c930b7c5dcf
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a462225bb752836ea9add0e225db0aaadaa41b232c6f82c28d2365f80847a51a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 8b54ba8a630571cf7ead8ff8fb40e39efc4b37852b22a00fb85a8c930b7c5dcf
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 90216D74509301DF8710DF28C885AAAB7ECFE56364F104A1DF4A9C73A1EB359986CB93
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0081102A
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00811036
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00811045
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0081104C
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00811014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00811062
                                                                                                                                                                                                                                                                                                                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 008115BE
                                                                                                                                                                                                                                                                                                                                                        • _memcmp.LIBVCRUNTIME ref: 008115E1
                                                                                                                                                                                                                                                                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00811617
                                                                                                                                                                                                                                                                                                                                                        • HeapFree.KERNEL32(00000000), ref: 0081161E
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1592001646-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 5b592aac3eb90ee84384de33dfdb77ccadc5c668f7b27132b5841e26f9b9f257
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2f0dd5b005da9f80202475da1c0be02c6201c66e130a7a0070ef5d4b5b12f4bd
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 5b592aac3eb90ee84384de33dfdb77ccadc5c668f7b27132b5841e26f9b9f257
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0C215531E01108ABDF00DFA4C949BEEB7B9FF94344F084459E541AB241E731AA85CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0084280A
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00842824
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00842832
                                                                                                                                                                                                                                                                                                                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00842840
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2169480361-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 459599d348c72a4074221c6d1f30f13f0f7a81e4666e00cc7af659d3dca8b06f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6d6edc6f218f67560697b2ee54c1284ed801a6fc73095bf80e1ca62de043452d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 459599d348c72a4074221c6d1f30f13f0f7a81e4666e00cc7af659d3dca8b06f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7021D335209119AFD714DB24C844FAA7B99FF46324F158258F826CB6E2CB75FC42CB91
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00818D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0081790A,?,000000FF,?,00818754,00000000,?,0000001C,?,?), ref: 00818D8C
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00818D7D: lstrcpyW.KERNEL32(00000000,?,?,0081790A,?,000000FF,?,00818754,00000000,?,0000001C,?,?,00000000), ref: 00818DB2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00818D7D: lstrcmpiW.KERNEL32(00000000,?,0081790A,?,000000FF,?,00818754,00000000,?,0000001C,?,?), ref: 00818DE3
                                                                                                                                                                                                                                                                                                                                                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00818754,00000000,?,0000001C,?,?,00000000), ref: 00817923
                                                                                                                                                                                                                                                                                                                                                        • lstrcpyW.KERNEL32(00000000,?,?,00818754,00000000,?,0000001C,?,?,00000000), ref: 00817949
                                                                                                                                                                                                                                                                                                                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00818754,00000000,?,0000001C,?,?,00000000), ref: 00817984
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                                                                                                                                                        • String ID: cdecl
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: ac89f60d3cc9dc836beda0055fa4e3b23edd2d470fd19e32de03d61f7b0faf15
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fa8c2db5284cc1c2cf2ba900f07e2d27de3cadca98e5b613c606a79864a0dbb5
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ac89f60d3cc9dc836beda0055fa4e3b23edd2d470fd19e32de03d61f7b0faf15
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: AA11D33A201302ABCB159F38D845EBA7BBDFF95350B50802EF946C72A4EB359855C7A1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00847D0B
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00847D2A
                                                                                                                                                                                                                                                                                                                                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00847D42
                                                                                                                                                                                                                                                                                                                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0082B7AD,00000000), ref: 00847D6B
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$Long
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 847901565-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c050399ff5e834137a3bcc14b2a59bbf8e53bebd721d06c56e078df5a18b5a02
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 87094aa5715eee062c8cb7f1d4169a6ab2205526acabfd8d8aded194f60d2b02
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c050399ff5e834137a3bcc14b2a59bbf8e53bebd721d06c56e078df5a18b5a02
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DC117235615619AFCB109F68CC08B6A3BA9FF46360B158728F939D72F0E7349D51CB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 008456BB
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008456CD
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008456D8
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00845816
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 455545452-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0e4d1f276634818fcb86b1a879e1d557200c8c2cdf8c1fb243c237ff707999ff
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3484552f2f3c67d321c276cb60f82bb38d1ce680c39090847b957b44be3e2dbf
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0e4d1f276634818fcb86b1a879e1d557200c8c2cdf8c1fb243c237ff707999ff
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9111D67560060CA7DF209F65DC85AEE7B7CFF11768B104026F915D6182EB74D984CB64
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID:
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a274c5cf5801c76e1aa9d3645680ea80ecbe37bb4d67c34d36d2e2504d840e92
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fe290e7e2c72f60db6776a24b9c03c6fedfcdf2f563bb5cfae85e83dbc079d88
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a274c5cf5801c76e1aa9d3645680ea80ecbe37bb4d67c34d36d2e2504d840e92
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 880126B230768A7EF620567A6CC6F27261CEF893B8F710325F520611D2DB788C008230
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00811A47
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00811A59
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00811A6F
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00811A8A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3850602802-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: fbab5c9d7572e63aaca50371be4c4583fe74d3473cbe7cff835f32adddc45524
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c4ce0156bd020ed29fc44fdca4a23a53a34c0b2258e02c5a40e9d9a51a564818
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: fbab5c9d7572e63aaca50371be4c4583fe74d3473cbe7cff835f32adddc45524
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3811157A901229FFEF109BA48985FADBB78FF08750F200091EA00B7290D6716E50DB94
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0081E1FD
                                                                                                                                                                                                                                                                                                                                                        • MessageBoxW.USER32(?,?,?,?), ref: 0081E230
                                                                                                                                                                                                                                                                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0081E246
                                                                                                                                                                                                                                                                                                                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0081E24D
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2880819207-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: f93c5fd011f796ec07efb20c578a342a3d16b6d9f3852c41420741f68444ab7d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5ed4ae3820332df490a8b6845d92a328e42ffdddab12b8037817139b0a97c0fd
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: f93c5fd011f796ec07efb20c578a342a3d16b6d9f3852c41420741f68444ab7d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4511A176A04258ABCB119FACAC09ADA7BACFF46320F144255F925E3391D7B49D4487A0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateThread.KERNEL32(00000000,?,007DCFF9,00000000,00000004,00000000), ref: 007DD218
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 007DD224
                                                                                                                                                                                                                                                                                                                                                        • __dosmaperr.LIBCMT ref: 007DD22B
                                                                                                                                                                                                                                                                                                                                                        • ResumeThread.KERNEL32(00000000), ref: 007DD249
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 173952441-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 352b6130a77ccbddf48526a7e6c906f66062611a2b1cc07181f9c0b731c8a6d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e6c4c804c30b0d03289cef334efb6de2e75e4b90f32bfcfe37204c785bc332aa
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 352b6130a77ccbddf48526a7e6c906f66062611a2b1cc07181f9c0b731c8a6d0
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 7E01D236806208BBCB215BA5DC09BAE7A7DFF82330F10021BF925923D0DB799D01C6A0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007C9BB2
                                                                                                                                                                                                                                                                                                                                                        • GetClientRect.USER32(?,?), ref: 00849F31
                                                                                                                                                                                                                                                                                                                                                        • GetCursorPos.USER32(?), ref: 00849F3B
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00849F46
                                                                                                                                                                                                                                                                                                                                                        • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00849F7A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4127811313-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 680494a3136c8c5fcfdb74acc64cad369d0280f335facc23a24a5b0c55ed1445
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5cafb044af27647778c73202dd575c9ba5e31d02f2852246e480be5465c7f854
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 680494a3136c8c5fcfdb74acc64cad369d0280f335facc23a24a5b0c55ed1445
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 9811363690111EABDB20DFA8D8499EE77BCFB46311F000455F941E3140DB34BE86CBA1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 007B604C
                                                                                                                                                                                                                                                                                                                                                        • GetStockObject.GDI32(00000011), ref: 007B6060
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 007B606A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3970641297-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 045f1a72f3a26d05369785865b7cb313a5ddb26b8ebb23e05a574f5b3063e17a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3309361e98cc23b9cd5a51cf7ca7c9fe72dea1382fae584b3c3a91f7236cf04a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 045f1a72f3a26d05369785865b7cb313a5ddb26b8ebb23e05a574f5b3063e17a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 6D115B72502508BFEF529FA59C44EFABBADFF197A4F040216FB1452120D73A9C60DBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 007D3B56
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 007D3AD2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007D3AA3: ___AdjustPointer.LIBCMT ref: 007D3AED
                                                                                                                                                                                                                                                                                                                                                        • _UnwindNestedFrames.LIBCMT ref: 007D3B6B
                                                                                                                                                                                                                                                                                                                                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 007D3B7C
                                                                                                                                                                                                                                                                                                                                                        • CallCatchBlock.LIBVCRUNTIME ref: 007D3BA4
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 737400349-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: cce51fc8d84b2eb94deed27e5dbd3e9b0634cff22a8469cc805a35ee2300c8b5
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 0C012D72100148BBDF115F95CC46DEB3F7AEF48754F04401AFE4856221C73AE961DBA1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007B13C6,00000000,00000000,?,007E301A,007B13C6,00000000,00000000,00000000,?,007E328B,00000006,FlsSetValue), ref: 007E30A5
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32(?,007E301A,007B13C6,00000000,00000000,00000000,?,007E328B,00000006,FlsSetValue,00852290,FlsSetValue,00000000,00000364,?,007E2E46), ref: 007E30B1
                                                                                                                                                                                                                                                                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,007E301A,007B13C6,00000000,00000000,00000000,?,007E328B,00000006,FlsSetValue,00852290,FlsSetValue,00000000), ref: 007E30BF
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3177248105-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 21b25d95abe8e4727473bc62f650161a6e36fb394b710fd07915f4c96f78dbe8
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: ffe4ef273f0a4e12a9df7f7297eb37be5b9a71668a13bdf0df0555b1d2048d34
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 21b25d95abe8e4727473bc62f650161a6e36fb394b710fd07915f4c96f78dbe8
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1601F736303266ABCB718B7A9C4CA677B9EBF4AB61B200720F905E3140C729D901C6E0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0081747F
                                                                                                                                                                                                                                                                                                                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00817497
                                                                                                                                                                                                                                                                                                                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 008174AC
                                                                                                                                                                                                                                                                                                                                                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 008174CA
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1352324309-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 650b28fb4d1f4606f36a3286b1f94754efeb9c36d5742fb40b42ceb42fb32aae
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 075e860acb4a582f8c5229e99f74c871f2bc8db29abf888d9e46979e1510225f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 650b28fb4d1f4606f36a3286b1f94754efeb9c36d5742fb40b42ceb42fb32aae
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 99118BB9206315ABE7208F18DD08FD27BFCFF00B04F10856EA656D6191DBB0E984DBA4
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0081ACD3,?,00008000), ref: 0081B0C4
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0081ACD3,?,00008000), ref: 0081B0E9
                                                                                                                                                                                                                                                                                                                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0081ACD3,?,00008000), ref: 0081B0F3
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0081ACD3,?,00008000), ref: 0081B126
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2875609808-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 48a2ef8fb6b148cdac123c23a5e487312f96d426a28dff42fe670c231cd38b89
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: da1fa793a2001e17270a5096d12a3f86bbcd1b0f2dc09c75e3182ef8c50a4a9d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 48a2ef8fb6b148cdac123c23a5e487312f96d426a28dff42fe670c231cd38b89
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 38113931C0292DE7CF00AFE4E958AEEBB7CFF0A711F114089D955B2181DB309690CB51
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(?,?), ref: 00847E33
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00847E4B
                                                                                                                                                                                                                                                                                                                                                        • ScreenToClient.USER32(?,?), ref: 00847E6F
                                                                                                                                                                                                                                                                                                                                                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00847E8A
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 357397906-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 650e60726384ca0732650777651d1df83275e1d1b7f884e1c791fbf75fad9e48
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 0ddbd39e18f86e502b8d5086b5f87fbfb66fe1da482e0a9919193be094b3d241
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 650e60726384ca0732650777651d1df83275e1d1b7f884e1c791fbf75fad9e48
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 771153B9D0020AAFDB41CF98C884AEEBBF9FF19310F509166E915E3210D735AA54CF90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00812DC5
                                                                                                                                                                                                                                                                                                                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00812DD6
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00812DDD
                                                                                                                                                                                                                                                                                                                                                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00812DE4
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2710830443-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: ee6c6068d4d00478175ac7889816a09b3f5d876ebf92eab2c29cb7e5b680033f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 47df54622771c2c631a9e814110f028368c56dbe4443fc2fb7b64ba95f0b0cba
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ee6c6068d4d00478175ac7889816a09b3f5d876ebf92eab2c29cb7e5b680033f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 35E0EDB56022287AD7601BA2EC0DEEB7E6CFF57BA1F414119B506D10909AA58981C6B1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007C9693
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9639: SelectObject.GDI32(?,00000000), ref: 007C96A2
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9639: BeginPath.GDI32(?), ref: 007C96B9
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007C9639: SelectObject.GDI32(?,00000000), ref: 007C96E2
                                                                                                                                                                                                                                                                                                                                                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00848887
                                                                                                                                                                                                                                                                                                                                                        • LineTo.GDI32(?,?,?), ref: 00848894
                                                                                                                                                                                                                                                                                                                                                        • EndPath.GDI32(?), ref: 008488A4
                                                                                                                                                                                                                                                                                                                                                        • StrokePath.GDI32(?), ref: 008488B2
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1539411459-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 1d02b8c2d0304f3b9224204003e37026857f277bb04c0cdb940d10920d9ff681
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 20a38d9ed3dd85ae02279bfa6b9c1a4f6ad8188e8f8fe8181ec2984ddeb694ae
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 1d02b8c2d0304f3b9224204003e37026857f277bb04c0cdb940d10920d9ff681
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: FFF03A3A042658FADB125F94AC0DFCE3F5DBF16310F448100FA11650E2CB795511CBA9
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(00000008), ref: 007C98CC
                                                                                                                                                                                                                                                                                                                                                        • SetTextColor.GDI32(?,?), ref: 007C98D6
                                                                                                                                                                                                                                                                                                                                                        • SetBkMode.GDI32(?,00000001), ref: 007C98E9
                                                                                                                                                                                                                                                                                                                                                        • GetStockObject.GDI32(00000005), ref: 007C98F1
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 4037423528-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: bb042d19db3b5bb4f6906f3dc882655ad4791df2d0d743e664fc3f8eb4fca947
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 87c73e50b79ce0d56a9dc8e4514ff6f1d15e70f6bbe25832d6a4961b6a7a5c5d
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: bb042d19db3b5bb4f6906f3dc882655ad4791df2d0d743e664fc3f8eb4fca947
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 10E06D35645680AAEBA15B74AC09BE83F24FB16336F04821AF7FA980E1C7715640DB10
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentThread.KERNEL32 ref: 00811634
                                                                                                                                                                                                                                                                                                                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,008111D9), ref: 0081163B
                                                                                                                                                                                                                                                                                                                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,008111D9), ref: 00811648
                                                                                                                                                                                                                                                                                                                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,008111D9), ref: 0081164F
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3974789173-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: a078a80f433d401bac9efca365a8b1257342b8008e380df04017da6c866e0e6d
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e64f9d6bbc5286c102c18ad84a9b7e0be76c1581370867597684db660c95620a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: a078a80f433d401bac9efca365a8b1257342b8008e380df04017da6c866e0e6d
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: AEE04F356022119BDBA01FA19D0DB867B6CFF56791F144809F246C9090D6644480CB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetDesktopWindow.USER32 ref: 0080D858
                                                                                                                                                                                                                                                                                                                                                        • GetDC.USER32(00000000), ref: 0080D862
                                                                                                                                                                                                                                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0080D882
                                                                                                                                                                                                                                                                                                                                                        • ReleaseDC.USER32(?), ref: 0080D8A3
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2889604237-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 71af866e893cf2f108df2042461eec6fefa9a422a0a2af59f33a3eb0dc9d6d73
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 13321e3ed673f8acc9d190eacb0a759ad6745cbe7fdaf895e1cfbf6239a866b8
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 71af866e893cf2f108df2042461eec6fefa9a422a0a2af59f33a3eb0dc9d6d73
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1AE01AB9801204DFCB919FA0D80CA6DBBB9FB19310F15D45DF806E7260C7388941EF40
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetDesktopWindow.USER32 ref: 0080D86C
                                                                                                                                                                                                                                                                                                                                                        • GetDC.USER32(00000000), ref: 0080D876
                                                                                                                                                                                                                                                                                                                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0080D882
                                                                                                                                                                                                                                                                                                                                                        • ReleaseDC.USER32(?), ref: 0080D8A3
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2889604237-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 92930487ac24d5aeb003586e5637af17dc9f4d468713c256e5f06a10f4043d81
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fb8f7df383d276537f4b873886af573eceff8f8f58ac5c3633cf56e53c440740
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 92930487ac24d5aeb003586e5637af17dc9f4d468713c256e5f06a10f4043d81
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 03E012B9801200EFCB91AFA0D80CA6DBBB9BB18310B15904DF80AE7260CB385901EF40
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B7620: _wcslen.LIBCMT ref: 007B7625
                                                                                                                                                                                                                                                                                                                                                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00824ED4
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Connection_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: *$LPT
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: de3851ac7415a48714198584cb8f17bb04a90975008747e8fd448ae4c52b6340
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e455c64542f3f60f92b3bc824cbfb99804a26d372fdb64951ebe8365511e19c9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: de3851ac7415a48714198584cb8f17bb04a90975008747e8fd448ae4c52b6340
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 90915D75A00214DFDB14DF54D584EA9BBF1FF84308F199099E80A9B3A2CB35ED85CBA1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • __startOneArgErrorHandling.LIBCMT ref: 007DE30D
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ErrorHandling__start
                                                                                                                                                                                                                                                                                                                                                        • String ID: pow
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c24ba329d51ee94fb4fec6408fa400269111273a5592d596e66f879c91bccf1c
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: d1aca00e533d87af2d3d85465686fa6d49425c17236073528bbe33e1683875b8
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c24ba329d51ee94fb4fec6408fa400269111273a5592d596e66f879c91bccf1c
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 55517D61A0D24296CB1BB715CD453793BB8FB44741F34899AF0D54A3E9EF3C8C81DA46
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID:
                                                                                                                                                                                                                                                                                                                                                        • String ID: #
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 0-1885708031
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 731caa0cacfd3f05764a35a1f52625675a7d55b90583395a9d3c5173bf92b4da
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a0e0574afa566caabd0df11704e73db328291abee784368646056cd2d93df8d9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 731caa0cacfd3f05764a35a1f52625675a7d55b90583395a9d3c5173bf92b4da
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 4A513335601246DFDB25DF28C885BFA7BA8FF55310F24845DE891DB2C0DA389D42CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • Sleep.KERNEL32(00000000), ref: 007CF2A2
                                                                                                                                                                                                                                                                                                                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 007CF2BB
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                                                                                                                                                        • String ID: @
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4231ab75b2eb5cab69395742c67e2dbbb786614f2f3ecc27fb58f946dee20a4e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3bde580d16c01c80ca60aa0703b44a4a87176a18361d47c7f36ffcf31841fa65
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4231ab75b2eb5cab69395742c67e2dbbb786614f2f3ecc27fb58f946dee20a4e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 26512472418744DBD320AF10D88ABABBBF8FB84300F85885DF199811A5EB748529CB67
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 008357E0
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 008357EC
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: CALLARGARRAY
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 157775604-1150593374
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: ef9914f2316c5b5c340b2b8de7b61d74cc9b7b2adf359d4ace5b879e325c03a6
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 9b4aa4ad0486f56b69684687b479536400e46f84f8c4f47c98e3771e86572609
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ef9914f2316c5b5c340b2b8de7b61d74cc9b7b2adf359d4ace5b879e325c03a6
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CE417B71A00209DFCB14EFA9C8869AEBBB5FF99724F14406DE505E7291E7349D81CBA0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 0082D130
                                                                                                                                                                                                                                                                                                                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0082D13A
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: |
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 596671847-2343686810
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e6bdfb16a3302687b4c644f36a6cbc6ef092c59fb416fecf6aec27b1ca3c13bc
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 90cb027f29bb1966fd41cade51f9b97d776b7f7d4da69dfbe65080a66a028a56
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e6bdfb16a3302687b4c644f36a6cbc6ef092c59fb416fecf6aec27b1ca3c13bc
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: DA313D71D00219EBCF15EFA4DC89AEEBFB9FF04304F100019F915A61A2E735AA56CB50
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00843621
                                                                                                                                                                                                                                                                                                                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0084365C
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$DestroyMove
                                                                                                                                                                                                                                                                                                                                                        • String ID: static
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 688bd237000074de105d2383361a3d5fd7f51f6e6472c3abcd8a4bde059f4084
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: b38273474efd00566f789cc8dc224cdf0dea4106e98ef89d1b150c0d8388403b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 688bd237000074de105d2383361a3d5fd7f51f6e6472c3abcd8a4bde059f4084
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2E318B71100208AEDB109F28DC81FFB73A9FF98724F01961DF9A5D7280DA34AD91D760
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0084461F
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00844634
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                        • String ID: '
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: ddc320d0b2ac1850c42bd35a704b1aa1591d15bcea3de07d3f71126650ad9518
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: c4464c42456f18ed92abcffdef0fb7452e3bce76c10ba5e013144f27457a82e5
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: ddc320d0b2ac1850c42bd35a704b1aa1591d15bcea3de07d3f71126650ad9518
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C1311674A0120A9FEF14CFA9C981BDABBB5FB09304F11516AE904EB341E770A941CF90
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0084327C
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00843287
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: MessageSend
                                                                                                                                                                                                                                                                                                                                                        • String ID: Combobox
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0f3fc38bb4fa408a60f52cc42f8321a926c22700b88828db42fa5a3438f93434
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 56c278f566167a7f9c7c240396078fed9a4896da22fac78da8aee52565d0a99f
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0f3fc38bb4fa408a60f52cc42f8321a926c22700b88828db42fa5a3438f93434
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C811E27130021CBFFF219E54DC84EBB376AFB94365F104129F918E7290D6B19D518760
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 007B604C
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B600E: GetStockObject.GDI32(00000011), ref: 007B6060
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 007B606A
                                                                                                                                                                                                                                                                                                                                                        • GetWindowRect.USER32(00000000,?), ref: 0084377A
                                                                                                                                                                                                                                                                                                                                                        • GetSysColor.USER32(00000012), ref: 00843794
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                                                                                                                                                        • String ID: static
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 98fb6cb6d2af43dfd6a7543cab4fda905cac549e0ee2f579513fbce18c972d3e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: bdebe9097ade9d6eb677833f92052c27917069f6c898326c9138d3eaf3068594
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 98fb6cb6d2af43dfd6a7543cab4fda905cac549e0ee2f579513fbce18c972d3e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1A1114B2610209AFDB00DFA8CC46AEA7BB8FB19314F014925F995E2250EB35E8519B60
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0082CD7D
                                                                                                                                                                                                                                                                                                                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0082CDA6
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Internet$OpenOption
                                                                                                                                                                                                                                                                                                                                                        • String ID: <local>
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 942729171-4266983199
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7546942a85d1c6e1dbfb562718d782b7ccfa52b5ba45c7ef3892fb5f4ae9eb21
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 866c55de97b99e9a797e4d49d9dd54627f7970ff85f50d424ab671f10b64b5c5
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7546942a85d1c6e1dbfb562718d782b7ccfa52b5ba45c7ef3892fb5f4ae9eb21
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: CF11C675205635BAE7744B669C45EFBBE6CFF127A8F004226B109C3180D7749885D6F0
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetWindowTextLengthW.USER32(00000000), ref: 008434AB
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008434BA
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: edit
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2978978980-2167791130
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0b05aa99c5084f3edc06199eae86ab3daaf553215719654eefe4616b8dbdac49
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 5ffc070907786c82c05a7ef23b8bbafb895468806aa7979e660796b310a58703
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0b05aa99c5084f3edc06199eae86ab3daaf553215719654eefe4616b8dbdac49
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 1E118C7120020CABEB129E68DC44AEB3B6EFB25378F504324FA65D31E0C775DD519B68
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                        • CharUpperBuffW.USER32(?,?,?), ref: 00816CB6
                                                                                                                                                                                                                                                                                                                                                        • _wcslen.LIBCMT ref: 00816CC2
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                                                                                                                                        • String ID: STOP
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0de969964638197b9059f1a4e327ba514083c316271e4de17f6dedfea8ee5a6e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: fe1d592cee2147167a732a5a081b95cd2af626aef173e5642108d64bb8716bb8
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0de969964638197b9059f1a4e327ba514083c316271e4de17f6dedfea8ee5a6e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 2001C832A005268BCB209FBDDC859FF77B9FF617147500524E9A2D6194FB35D990C690
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00811D4C
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 44c664b64b4fc40eae469592dcfb40b3089f4f476fe2ffc8a953e8b8bd079b3f
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 355a8ff5885acc09cf363920a7c1f8545435a2eda2ff57a6f7f2e6c743d8a9b7
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 44c664b64b4fc40eae469592dcfb40b3089f4f476fe2ffc8a953e8b8bd079b3f
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 3E01D875601218AB8F04EBA4DC59DFE776CFF56350B140519FA36A73C1EA345948C660
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00811C46
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: afcc4f6516009f8c547af5e5925e11f1a9e452c6337d5b4a97c9769845ccd119
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 3dbd65f795c5e87bdaf3cc0415f2a458daab8c1434daee9773a16fab64a6404e
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: afcc4f6516009f8c547af5e5925e11f1a9e452c6337d5b4a97c9769845ccd119
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 24016775781108A7CF14EBA4C959AFFB7ACFF15340F140019BA27B7281EA649E48D6F1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00811CC8
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c929876f72f8c983fd04f0f3843675249c88346ce7b9cad841efd8ec880a2e34
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: af2df4fd33fa047b78ba71b34cd1b64b27c7ef02900a72a847b160a2c4dac923
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c929876f72f8c983fd04f0f3843675249c88346ce7b9cad841efd8ec880a2e34
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 16016775641118A7CF14E7A4CA59AFE77ACFF11340B540015BA16F3281EA659F48C6F1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007B9CB3: _wcslen.LIBCMT ref: 007B9CBD
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 00813CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00813CCA
                                                                                                                                                                                                                                                                                                                                                        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00811DD3
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: b9cad59d8d61aa57293a647d1a203afce2228bac2b7668dd5f16f7051381456e
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 8ed1e5e2453ce5bfbb9405e2f0c8d69b5130a39d5efa73596a3fa99c785b1b4a
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: b9cad59d8d61aa57293a647d1a203afce2228bac2b7668dd5f16f7051381456e
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C7F0A471A41218A7DF04E7A4DC9ABFE776CFF02354F140919BA36E32C1EA64994882A1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: _wcslen
                                                                                                                                                                                                                                                                                                                                                        • String ID: 3, 3, 16, 1
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 176396367-3042988571
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 9f12e271cb67e940d73a0713f41820832bd969109cbe90b71bf67f98d2b41939
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: dc864e4d952e30fa594f8c27769b698985bfc8a4d0c7135bbed5b46ae303ab39
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 9f12e271cb67e940d73a0713f41820832bd969109cbe90b71bf67f98d2b41939
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 91E06182305320719331137BDCC597F5699EFC9750B10182BF9C5C236AFAA8ED9193E5
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00810B23
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Message
                                                                                                                                                                                                                                                                                                                                                        • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 0e0eeba441f5d5ca36342d55727677013595dadd99b6875fa6285fd5ba0b5588
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a4b8b483dcb5d5ef85070187c6243648818fb49017b1517cb1003bd9dc536497
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 0e0eeba441f5d5ca36342d55727677013595dadd99b6875fa6285fd5ba0b5588
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: C9E0923128931876D2102694BC07F897B88EF05B20F10442AF798955C38AE9649046E9
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 007CF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,007D0D71,?,?,?,007B100A), ref: 007CF7CE
                                                                                                                                                                                                                                                                                                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,007B100A), ref: 007D0D75
                                                                                                                                                                                                                                                                                                                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,007B100A), ref: 007D0D84
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007D0D7F
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                                                                                                                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 55579361-631824599
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: e547f1605994cf4680165de67cd9b24f8a37a5bb0e7f236ba47e2b23c8bf0abc
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: a4fdf2cc0019c5a3ee43742a9bfa33ad10526c74e515400b607aa2db2b9dba03
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: e547f1605994cf4680165de67cd9b24f8a37a5bb0e7f236ba47e2b23c8bf0abc
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: E7E06D742003118BD3609FB8E4087427BF5BB04741F00492EE482C6752DBF8E444CBE1
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0082302F
                                                                                                                                                                                                                                                                                                                                                        • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00823044
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: Temp$FileNamePath
                                                                                                                                                                                                                                                                                                                                                        • String ID: aut
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 33406ae8aef0cf0af239201b697ae239ba2021ab5c21085c1b2a3ce0146b08ef
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: e81a3babe13f0b0b7251f081ce54f30b2f972fbd36cee2666586f44e4729a2d9
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 33406ae8aef0cf0af239201b697ae239ba2021ab5c21085c1b2a3ce0146b08ef
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 98D05E7650133867DA60A7A4AC4EFCB7B6CEB05750F0002A1B655E2091EAF4D984CAD4
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: LocalTime
                                                                                                                                                                                                                                                                                                                                                        • String ID: %.3d$X64
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 481472006-1077770165
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7110b61ffbe97b82b312c7f374fa5a5703d167400860c87300c3b0d261b88ea1
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: df0cb18d1ddec9aa742374055d307fbc4bcf8584641ed9bd7d9ab1f796f90e1b
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7110b61ffbe97b82b312c7f374fa5a5703d167400860c87300c3b0d261b88ea1
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5BD012A180931CEACBD096E0CC49DB9B37CFB18305F508466F80AD1080D768E948AB61
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0084232C
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0084233F
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081E97B: Sleep.KERNEL32 ref: 0081E9F3
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: c8576065b501445a9aae6b6921dc2c580df56daef686a73fc5c60daae4d3c665
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 936b23977f1e719fe3cf86902c85832c08ded0b433b843a78ac64a7cf2d884d5
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: c8576065b501445a9aae6b6921dc2c580df56daef686a73fc5c60daae4d3c665
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 20D0A93A381300B6E2E8A7309C0FFCA6A18BB00B00F018A06770AEA1D0C8A4A801CA00
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0084236C
                                                                                                                                                                                                                                                                                                                                                        • PostMessageW.USER32(00000000), ref: 00842373
                                                                                                                                                                                                                                                                                                                                                          • Part of subcall function 0081E97B: Sleep.KERNEL32 ref: 0081E9F3
                                                                                                                                                                                                                                                                                                                                                        Strings
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                                                                                                                                        • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 4e1c624e1da4bd6ac43389eddc581ab89d77dc7f6dae138402ec877548a2774a
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 2d36e448977bbaa1e62ed39db9f3ddd06f4e3404d43831596448da2c508375ae
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 4e1c624e1da4bd6ac43389eddc581ab89d77dc7f6dae138402ec877548a2774a
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: A6D0A9363823007AE2E8A7309C0FFCA6A18BB01B00F018A06770AEA1D0C8A4A801CA04
                                                                                                                                                                                                                                                                                                                                                        APIs
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 007EBE93
                                                                                                                                                                                                                                                                                                                                                        • GetLastError.KERNEL32 ref: 007EBEA1
                                                                                                                                                                                                                                                                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007EBEFC
                                                                                                                                                                                                                                                                                                                                                        Memory Dump Source
                                                                                                                                                                                                                                                                                                                                                        • Source File: 00000001.00000002.1293408586.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293381407.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.000000000084C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293528650.0000000000872000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293654675.000000000087C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        • Associated: 00000001.00000002.1293707942.0000000000884000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                                                                                                                                        Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                                                                                                                                        • Snapshot File: hcaresult_1_2_7b0000_file.jbxd
                                                                                                                                                                                                                                                                                                                                                        Similarity
                                                                                                                                                                                                                                                                                                                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                                                                                                                                        • String ID:
                                                                                                                                                                                                                                                                                                                                                        • API String ID: 1717984340-0
                                                                                                                                                                                                                                                                                                                                                        • Opcode ID: 7b6ada164a8ca295b88806f991881dc366a0924043faf2c6e5892e392aa0dff9
                                                                                                                                                                                                                                                                                                                                                        • Instruction ID: 6ab9e0bb520bff7adada0835ff20473fbf7aa37c125d7e425345c7e21e527321
                                                                                                                                                                                                                                                                                                                                                        • Opcode Fuzzy Hash: 7b6ada164a8ca295b88806f991881dc366a0924043faf2c6e5892e392aa0dff9
                                                                                                                                                                                                                                                                                                                                                        • Instruction Fuzzy Hash: 5341D735602286EFCF218FA6CC84ABB7FA5AF49310F144169F959972A1DB349D01DB60